Security

Home/Posts/Security

Three Ways to Boost Email Security

By |2020-09-22T21:27:31+00:00September 22nd, 2020|Internet Security, IT Security, Security|

In 1978, a marketing manager with Digital Equipment Corporation sent an unsolicited electronic message to hundreds of ARPANET users promoting the company’s new mainframe computers. It is the first known instance of spam, and it kicked off four decades worth of unwelcome, unwanted and unrelenting email abuses. Email has since become the de facto standard [...]

Backup Modernization Critical for Thwarting Ransomware Attacks

By |2020-09-15T13:34:57+00:00September 15th, 2020|Backup Recovery, Business Continuity, Security|

Ransomware attacks are up sharply during the coronavirus pandemic, with researchers identifying nearly 80 million such attacks during the first half of 2020 — a 109 percent increase from 2019’s midyear total. In a particularly concerning trend, many of these attacks are now targeting backup data in addition to primary data. Robust backup practices have [...]

Don’t Allow Users to Have Unfettered Access to Data Files

By |2020-09-02T01:26:22+00:00September 2nd, 2020|Cyber Security, IT Security, Security|

Few organizations would give every employee access to HR and accounting systems. But an astonishing number of organizations fail to control access to other sensitive information. A 2019 study by Varonis Data Lab found that 53 percent of companies had at least 1,000 sensitive files that could be accessed by all employees. Almost one-quarter (22 [...]

Frameworks Enable a Best-Practice Approach to Cybersecurity

By |2020-07-21T12:20:42+00:00July 21st, 2020|Cyber Security, Internet Security, IT Security, Regulatory Compliance, Security|

Cybersecurity has never been more difficult. Threats are growing more frequent, sophisticated and costly. Data, devices and other assets keep moving beyond the reach of network perimeter defenses. Increasing government and industry regulations keep adding layers of complexity. If only there was an instruction manual that explained how to deal with it all. Turns out, [...]

How Your MSP Can Help with Regulatory Compliance in the Age of Remote Work

By |2020-07-15T17:54:28+00:00July 15th, 2020|Managed Services, Regulatory Compliance, Security|

Many organizations have done a remarkable job of transitioning to remote work — virtually overnight. IT teams who may have had limited experience working with remote workers found themselves grappling with virtual private networks (VPNs), collaboration platforms, and cloud-based applications and data storage. They deserve a giant pat on the back for keeping their organizations [...]

Ransomware Payments Produce Unintended Consequences

By |2020-06-30T12:54:43+00:00June 30th, 2020|Backup Recovery, Cyber Security, Internet Security, IT Security, Security|

The University of California at San Francisco announced recently that it paid a $1.14 million ransom to regain access to medical school data that was encrypted during a ransomware attack. The incident illustrates a disturbing trend — ransomware attacks are steadily increasing, as are the ransom amounts being demanded. The average ransom demanded in attacks [...]

7 Remote Security Strategies for Small to Midsize Businesses

By |2020-05-28T01:43:56+00:00May 28th, 2020|Backup Recovery, Managed Services, Security|

The sudden shift to remote work has led many small businesses to adopt practices that may be creating considerable cybersecurity threats. For example, several surveys find that as many as half of remote workers are potentially exposing sensitive company information by using unsecured applications and endpoint devices. The Department of Homeland Security’s cybersecurity division has [...]

Minimize Firewall Configuration Errors to Boost Security

By |2020-03-17T00:20:30+00:00March 17th, 2020|Cyber Security, Internet Security, IT Security, Security|

Firewalls have been an essential first line of defense in network security for decades, serving as the gatekeeper between internal network resources and the outside world. However, mismanaged or misconfigured firewalls are barely better than having no firewall at all. The massive Capital One breach last year illustrates the danger. A misconfigured firewall rule enabled [...]

6 Tips for Effective Allocation of Cybersecurity Dollars

By |2020-03-04T19:48:54+00:00March 2nd, 2020|Security|

Improving network security is a top budget priority for 2020 in most organizations, and with good reason — cybercrime is growing at an astonishing rate. Data breaches hit an all-time high in 2019, and analysts say 175 million individuals become victims of cybercrime each year. Increased spending won’t necessarily address the problem, however. In fact, [...]

If Humans Are Your Weakest Security Link, Train Your Humans

By |2020-02-14T18:50:30+00:00February 13th, 2020|Cyber Security, Internet Security, Security|

Even with advanced technologies available to hackers, what technique do they use most often to gain access to sensitive data or spread malware? Phishing attacks. Hackers know it’s much easier to trick a human with a deceptive email than it is to trick or circumvent security software. Instead of trying to pick a lock, they [...]