The IT World Is Dangerous; You Need a Backup Plan

Posted by Mike Amaral on 5/5/17 2:52 PM

If your company is like most, you build your worth around information. Client records, research material, inventory data, and financials are all heavy hitters. Now imagine if just one of these critical pieces of information became totally compromised or irretrievable, disappearing in the blink of an eye.

Read More

Topics: Backup and Disaster Recovery

3 Ways Your Network is Vulnerable to Hackers

Posted by Justin May on 4/21/17 8:08 AM

Every month it seems, another large company suffers a network breach or unauthorized access to sensitive information. The number of well-known hacking victims keeps getting larger:

Read More

Topics: IT Security

Tax Season 2017 Is High Season for Spear Phishing Attacks

Posted by Andrew Josephides on 3/21/17 8:10 AM

It’s tax season. And that means, for internet scammers looking to filch your employees’ identities and steal their money, it’s phishing season.

According to a warning issued by the IRS, tax season triggers a 400 percent surge in phishing and malware incidents. The scammers’ target? The sensitive information found on your employees’ W2 forms:

Read More

Topics: IT Security, Email

4 Steps for Designing an Effective Insider Threat Program

Posted by Andrew Josephides on 3/7/17 8:01 AM

The cost of cybercrime is going nowhere but up. Meanwhile, the news reports on staggering incidents of mass data theft on a regular basis. If you’ve become obsessed with combatting intrusion from outside hackers and scammers, it’s understandable.

But if you’re only looking outward, you may be missing one of the leading and most damaging risks to your cybersecurity: those who work in and with your organization.

No one wants to believe their colleagues and partners would compromise their data security – either deliberately or mistakenly – but it happens more often than you would think.

Read More

Topics: IT Security

Slack vs. Microsoft Teams: Which Is Right for Your Office?

Posted by Steven Vigeant on 2/14/17 8:43 AM

It seems like eons have passed since email promised to make office communication easier, more pleasant, and more fun. Remember the feeling? No more navigating awkward voicemail menus, missing connections, or squinting at smudged faxes.

But now, as we confront our overflowing inboxes with dread every morning, many of us long to go back to the days when the desk phone was more than an inert prop and critical information was shared — shockingly — face to face.

Read More

Topics: IT Support

What Is Penetration Testing and Do I Really Need It?

Posted by Andrew Josephides on 2/9/17 8:00 AM

We don’t have to tell you your organization’s IT system is deeply complex. To provide even the most basic services to your users, many layers of hardware and software combine.

Lurking within these layers are vulnerabilities – weaknesses that can be exploited to inflict costly damage on yourorganization. And as the layers of your IT system multiply, so do their vulnerabilities, whether they’re problems in the operating systems, application flaws, or improper configurations.

How do you find these weak points before the bad guys do? That’s exactly what penetration testing is for and why it is a critical part of a company’s security policy.

Read More

Topics: IT Security

4 Expert Tips for Creating an Enforceable IT Security Policy 

Posted by Steven Vigeant on 1/26/17 8:00 AM

As we wrote in our last post, an enforceable IT security policy  is an important part of your organization’s security strategy. Unfortunately, many companies don’t have this policy. As many as one in three companies lacks an information security policy.

It’s not enough to develop this and then put it away. Depending on the size and type of your business this should be visited at least annually with the stakeholders in the systems and processes that are part of the security policy. If this is not done it is difficult to enforce and be sure it meets the needs of the business over time.

Read More

Topics: IT Security Policy

Draft an IT Security Policy in 2017

Posted by Steven Vigeant on 12/27/16 8:14 AM

Nobody enjoys creating policy. It’s complicated, detail-oriented work and just asking for endless debates over minutiae. And the results of the arduous policy-making process are often overlooked or outright ignored. Sometimes it feels like people are going to do whatever they want to do, regardless of your well-crafted, comprehensive policy.

So why bother going to the effort of writing an IT security policy for your business? Surely, there are better ways to spend your time.

Read More

Topics: IT Security

How MDM Software Makes Corporate Mobility Less Scary

Posted by Erich Beyer on 11/15/16 8:33 AM

Your company’s employees want to use their mobile devices to get work done. They want to be able to check email from their smartphones and edit cloud-based spreadsheets on their tablets. They want to review their calendars over the weekend and share data with prospects on a sales call.

A mobile-empowered workforce is in

your company’s best interests, as well. According to some studies, mobile devices can allow employees to gain up to nine extra work hours per week.

But mobility has its downside, and this is what keeps IT professionals up at night.

Along with an increase in productivity comes a decrease in data security. Mobile devices introduce several new ways for sensitive company data to become compromised, especially when that data is stored or accessed not from company-issued devices, but personal devices. (This is often called “BYOD” for “bring your own device.”)

Read More

Topics: data security, Mobile Device Management

Why Laptop Encryption is a Must for All Businesses (Not Just Big Ones)

Posted by Steven Vigeant on 10/25/16 8:30 AM

You’re on your way home from work, your trusty laptop on the passenger seat beside you so you can pick up where you left off at home. You stop in at a coffee shop to refuel for the evening, and when you get back to the car — your laptop’s gone. Someone broke in and made off with it.

Losing a laptop is never fun. At minimum, you or your company will have to pay to replace it. But your laptop login is password protected. So at least your valuable company data is safe.

Right?

Not exactly. It doesn’t take much for a hacker to crack a password-protected laptop. He could use a USB stick to boot up a new operating system, for example, and see all the files on your hard drive. Or he could simply unscrew the hard drive and place it in a different computer.

Read More

Topics: IT Security


 Comments