IT Security Tips for Small Business
Because IT and cybersecurity is such an IMPORTANT issue, we are promoting a series of IT security articles with useful tips to show you and your employees how to significantly improve your protection from being a victim of cybercrime. Every business must make certain their employees are clear on how to appropriately use, handle and protect company data and devices.
Every time we focus on one simple, specific action you can take to avoid a potential data breach. If you would like to receive these weekly articles via email, please subscribe to our newsletter.
IT and Cybersecurity Tips Blog Archive
In IT, endpoint security refers to a methodology of protecting the business network when accessed through such remote devices. In the last few years, IT industry’s focus had shifted from a perimeter network security to endpoint and data security solutions....read more
If you haven’t encountered it yet, you’ve heard about it: ransomware is a type of malicious software designed to encrypt the data or block access to a computer system until a demanded sum of money is paid online. Traditionally, most ransomware thrived on...read more
While it is important to realize that hacking is a real, external threat, it is even more important to remember that hacker’s take advantage of existing, internal vulnerabilities. According to the latest 2016 State of SMB cybersecurity study by the Ponemon...read more
One of the biggest threats to your data is the popular advance of Bring You Own Device (BYOD) policies and mobile workers. According to Gartner is expected that half of all businesses will have a strong need for a BYOD policy this coming year. Employees will be using...read more
A phishing e-mail is a bogus e-mail request that is designed to look like a legitimate request from a sender you trust in an effort to get you to provide your credentials such as login information to a specific website. It can also try to trick you into clicking on...read more
Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, a hacking software can guess a five-character password in under three hours. If you only use lowercase...read more
You’re a hardworking team player who likes to check e-mail and get a few things done after hours – all good! But here’s something you might not know: you should never access company data, file servers or applications through personal devices and home PCs that are not...read more
You probably have seen it before – or not – but there is a sneaky bait and switch trick used by some hackers. It works like this: they register and set up a fraudulent website that is a very close misspelling of a legitimate one. For example,...read more
There is a legion of hackers out there who have just ONE goal in mind: to find a new access to your computer through in a commonly installed software such as Adobe, Flash or QuickTime, among others. What they are looking for is a vulnerability. In computer security,...read more
If you plan on on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop – DON’T! Unless your personal device is covered under a Managed Services plan, you could accidentally introduce a virus to the company’s...read more
Automatic Clearing House Fraud (ACH Fraud) is a growing trend among hackers who steal money from business bank accounts. You probably know that… but did you know you could lose your money because your business bank account doesn’t have the same protection...read more
Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher). The threat was fairly straightforward: Pay...read more