The Importance of a Proactive, NOT Reactive Approach With the major role information technology plays in the way business is conducted in today's world, it's crucial that every business owner, both large and small, be able to see the big picture of protecting client and company data from disaster. Data backup disaster comes in many forms, from hackers to employee sabotage, to viruses and natural disaster, it's critical to your business operation that you understand the scenarios and solutions … Read more
Is Working on Personal Devices Risky Business?
It's natural and common for your employees to want to conduct some of their work at home or on the road, and often the most convenient way is to do so on their personal devices. However, this could be putting your business at risk, and thus allowing your employees to conduct their work on personal devices could be risky business. The Risk of Not Being Regulated Since your employees personal devices aren't the property of the company, they aren't being properly protected and regulated. And … Read more
Is Your BYOD Policy HIPAA Compliant?
Bring Your Own Device or BYOD policies are a great tools for employees and a money saver for companies, but it can also be a risky policy if not conducted properly. Mobile devices and a BYOD policy in the health care field can allow professionals to easily transition workflows, boost productivity and improve communication. The major issue with a BYOD policy in this field is the risk of security breaches leaking personal information and medical records of the patients. This is not only a concern … Read more
Tips to Sink ATM Skimming
Today's world is far from the wild west, but bank robbers are still rampant and constantly after your money. The only difference is there tactics are far more technologically advanced. Criminals gain access to your bank account via ATM machines and some sneaky skimming of your money. These criminals use a combination of advanced card readers attached to the machine to capture your card information and small hidden cameras to snag your pin number. These cyber criminals then sell your … Read more
Apple Devices Can Get Viruses
Are you under the impression Apple devices are exempt from viruses and hacking? A great deal of Apple users consider Apple systems safer to use than Windows because of the "built-in" security Apple programs into their devices. But Windows operating systems also come with similar existing security to prevent hackers and viruses. So why is there a difference in virus vulnerability? So here's the deal: In their advertising, Apple markets its systems as not needing third-party antivirus … Read more
How Safe is Your Password Really?
Imagine this: You're setting up your login information for your email, or maybe it's your Cloud database account. Upon entering your password, the program prompts you to include a capitalized letter, number and possibly a symbol in your password. You wonder, "Is this really necessary? Who's going to be THAT determined to break into my accounts?" Well to answer that question: hackers. Hackers are going to great lengths to recover your account login credentials. And as hackers develop more ways … Read more
9 Steps to an Effective Cyber Security Plan
There is not a day that goes by that you do not read in the paper or hear on television that some company has been the victim of Cyber Crime. The alarming thing is that for every incident that you hear about there are probably six more that have happened that you don't hear about. There are many reasons why people don't report about breaches. Probably the biggest of which is the damage to their reputation and the cost of properly handling the situation. Ponemon Institute recently reported that … Read more
Report Shows Small Percentage Of Employees Know About Ransomware
The statistics are alarming. Ransomware is fast becoming the favored hobby horse of hackers worldwide. Barely a week goes by that a new strain isn't introduced into the wild, with expensive, and often tragic consequences. Right now, the average amount paid by office workers impacted by a ransomware attack is $1400, a figure that continues to creep higher. What's perhaps even more alarming, however, is the fact that although companies the world over have made a concerted effort to sound the … Read more
WiFi Security Flaw Affects Millions Of Users And Devices
Security researchers have found a new critical security flaw dubbed “Krack” (Key Reinstallation Attacks) that affects literally every WiFi router and smart phone in use today. The reason? The security flaw resides in the WiFi standard itself, rather than in a third-party product. In addition to being vast in scope and scale, Krack is a particularly nasty, versatile flaw, allowing hackers to intercept credit card numbers, passwords, photos and a whole host of sensitive personal … Read more
Are You Protected From A Data Backup Disaster?
What Are You Waiting For? When it comes to protecting the critical files and documents for your business or company, are you taking the necessary precautions? Many small to medium sized businesses are faced with the same problem when it comes to data backup, and that problem is that they haven't done anything to prepare for it. To go from bad to worse, the necessary steps to protect your business from being down for days due to data loss are often over looked. Just because you haven't suffered … Read more









