IT Security Tips for Small Business
Because IT and cybersecurity are such an IMPORTANT issue, we are promoting a series of IT security articles with useful tips to show you and your employees how to significantly improve your protection from being a victim of cybercrime. Every business must make certain their employees are clear on how to appropriately use, handle and protect company data and devices.
Every time we focus on one simple, specific action you can take to avoid a potential data breach.
Browse the blog posts below for useful tips and information.
IT and Cybersecurity Tips Blog Archive
Cybercrime is a big and nasty business. According to Cybersecurity Ventures, small business (organizations with fewer than 250 employees) becomes a prevalent and profitable target: 58% of them were a cyber attack victims in the recent year, and the astounding amount...read more
A new MacOS vulnerability bug that reveals all of user's stored passwords to malicious apps was discovered by a German 18-year-old Linus Henze. He is not sharing the details with Apple at this time. The bug was verified and reported by Forbes; Apple is not commenting...read more
9to5Mac has discovered a significant bug in FaceTime app, and the news is running virally over social and major media outlets. Reportedly, when users start group FaceTime, they can immediately hear the audio coming from their phone, regardless of the other person...read more
General Data Protection Regulation (GDPR), a New Privacy Law, Makes Europe World’s "Tech Police" is a regulation in EU law (2016/679) on data protection and privacy for everyone within the EU. French data protection authority fining Google $57 Million (50 Million...read more
Today, one of the largest data breach data sets was released containing roughly 773 million unique records of email addresses and passwords. Microsoft Regional Director and MVP Troy Hunt obtained the original data set, titled ‘Collection #1’ from a hacker forum. The...read more
Cyberattack cleanups now come with a sticker shock: increase of 52% now brings the estimated amount to $1.1 million, with potential to increase even further, to a staggering $1.67 million, according to a recent Radware’s 2018-2019 Global Application and Network...read more
A new phishing attack is using fake non-delivery notification in an attempt to steal users’ Microsoft Office 365 credentials. These credentials will then be used to send messages from the users account, further spreading malicious emails and software. In this case,...read more
Each year, SplashData., Inc, a leader in password management, analyses leaked passwords to find the top commonly used passwords. In 2018, SplashData, Inc. had five million passwords to work from, most of them from hacks in the US and Europe. According to the...read more
The United Staes Computer Emergency Readiness Team (US-CERT) of the Department of Homeland Security (DHS) have issued a new alert for a ransomware known as SamSam (MSIL/Samas.A.) - just days after two mastermind suspects were charged by US Department of Justice. The...read more
The Internet of Things (IoT) devices are outnumbering the population of our planet. It is projected that the planet will have 20.5 billion devices just two short years away, in 2020. In the next five years the cybercrime is expected to result in business-related...read more
If not familiar, Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. A computer can become infected with Ransomware in a number of ways; thorough an email, an infected link, or even an infected ad on a...read more
While ransomware attacks have slowed down with cybercriminals shifting their focus to cryptojacking (mining virtual currencies), cyberextortion is still widespread. Here are a few examples of recent cyber extortion attacks: Systems of Onslow Water and Seer Authority...read more