Hello Everyone, Bad guys have reached an all-time low and we see a quadrupling of deliberate targets and people in QC organizations. We now strongly recommend all our customers use a form of end-user training – we use and support KnowBe4, which we see allows employees to recognize baddies and reduce mistakes in opening “bad”…
hacking
Why You Need Multi-Factor Authentication Today
Cloud adoption is pretty much a given for companies these days. The increase in cloud use over the last few years has helped small businesses be more competitive, and it has allowed many companies to continue serving customers during the pandemic. Cloud technology can keep a business going from any location; however, it can also…
How to Use Email Encryption to Protect Sensitive Communications
A plain text email is about as secure as a postcard. Any hacker or unintended recipient that intercepts a non-encrypted email can easily read it with no special skills or software needed. What’s even more eye-opening are the types of messages that employees send by unprotected email. They’ll send confidential customer information, passwords, and even…
Zero-Day Exploits and How to Defend Against Them
When reading about ransomware attacks or data breaches in the news, you’ll probably run across the term “zero-day exploit.” This type of attack is often at the heart of many widespread attacks because it’s one of the most difficult for traditional cybersecurity methods to detect. A recent example was the breach of the Microsoft Exchange…
Layered Security Services
Protecting your data, your processes, and your investment Companies across the globe took a new approach in 2020 to doing business, including moving more to the cloud and using virtual workflows for the first time. This opened the door even wider to cyberattacks. Cybercriminals look to businesses of all sizes, not just big businesses. Don’t…
Demonstrating Compliance With Data Security Regulations Can Be Easy If You Are Prepared
Keep a close watch on IT system access These days, most businesses are subject to data protection laws or regulations of one kind or another. Violations often come with pretty stiff penalties. To help demonstrate you are compliant with access control requirements, you should have clear policies and procedures about who gets access to what,…
Do You Know Who Has Access to Your Systems?
When you took their keys back, did you cancel their passwords, too? The last time an employee left your business, did you revoke their access to your IT systems? Are you sure? Do you have a way to check? What kind of information could your former employees get if they still hold valid credentials?…
What is the Best Way to Change Your Passwords?
You change your clothes. You change your oil. Make sure you also change your passwords. An alert pops up on your computer: It is time to change your password again. Sigh. Fine. You will just change from password4! to password5! and― Not so fast. Regular password changes are meant to make sure that even if…
How Strong Are Your Passwords?
Strong Security Starts with Strong Passwords If you use the same password for multiple systems―online shopping, email, your company’s cloud bookkeeping solution, etc.―you are not alone. Even Facebook founder Mark Zuckerburg is guilty of this. In 2016 his LinkedIn credentials were compromised in a major breach, giving hackers access to his Twitter account, too,…