Hacking is the new form of a “break in” in the digital age. Instead of paper files locked in cabinets, today’s businesses have digital files stored on premise or in the cloud, which are prime targets for hackers.
How savvy are your employees when it comes to cybersecurity? Today’s sophisticated phishing scams take more than an awareness poster to properly defend against.
Office 365 is used by more than half of the offices around the world. And as with any popular program, hackers are searching for vulnerabilities in order to breach it and get into your network and devices.
Most people understand the importance of backing up their data, especially if they’ve lost photos or files in the past. But with the advent of cloud-computing applications like Office 365, there’s a false perception going around that a backup isn’t needed, and the cloud is doing it all for them.
Valentine’s Day has been celebrated for centuries as a day to show love and affection for those special someones in our lives. Even as school children, many of us have fond memories exchanging valentines with our class and it being a day of feeling loved and appreciated.
All your best IT security efforts can be bypassed by a malicious piece of malware due to an unsuspecting click on a phishing email or fraudulent shopping ad. The human factor is often overlooked when it comes to network cybersecurity, with companies focusing more on applications and software.
If you regularly do business with the Department of Defense (DoD), then you know that it takes some work to meet all their compliance standards. Companies that know how to navigate the “red tape” can benefit significantly and gain an edge over their competition by selling their goods and services to the government.
There has been a tremendous uptick in cyber attacks this year. We are getting at least a call per week, sometimes a couple a week, on significantly compromised businesses calling for help. The following are some common factors that we see in these cases and some tips to help improve you cyber security. Common Factors…
At this year’s CornCon cybersecurity conference (https://corncon.net/) we learned about several USB devices an intruder could use to break into or even destroy a computer. The USB Killer (https://usbkill.com/products/usb-killer-v3) is a device that draws power from a USB port to charge up capacitors and then dump hundreds of volts back into the machine over…
Does your website have an SSL certificate? If not, Chrome, Firefox and Apple Safari mark you as “not secure.” How can you tell? When you look at your URL bar you will see either http:// or https:// before www.example.com. Google Chrome already positively labels sites that have been secured with an SSL certificate. They earn a…