8 Law Firm Cyber Security Best Practices

In 2015, an anonymous source leaked 11.5 million documents stolen from the Panamanian law firm Mossack Fonseca. The client information included in the leak affected over 200,000 entities in more than forty countries. Incidents like this highlight the need for a focus on law firm cyber Security. The law firm closed because of the scandal, which also resulted in the resignation of various high government officials. Just one year later, news reports broke that hackers had stolen information from as many as 48 major law firms, using that information to gain millions of dollars through insider trading. I could go…

READ MORE

4 Reasons to Consider a Managed Firewall

Managed Firewall – As the first line of defense in your business network security, a secure firewall is one of the most important pieces of your network’s infrastructure. Without it, any hacker or intruder could easily access your critical and confidential information. With more and more sophisticated threats developing every day, it can be difficult to stay ahead of the curve in keeping your business protected. It takes more than just purchasing a piece of hardware, plugging it in, and calling it good. Whether you have a dedicated IT person within your company or not, there are numerous benefits to…

READ MORE

What is a rootkit? And how to stop them

Computer viruses and other malware are real threats. And rootkit might be the most dangerous, both in the damage they can cause and the difficulty you might have in finding and removing them. Rootkits are a type of malware that are designed so that they can remain hidden on your computer. But while you might not notice them, they are active. Rootkits give cyber criminals the ability to remotely control your computer. Rootkits can contain a number of tools, ranging from programs that allow hackers to steal your passwords to modules that make it easy for them to steal your…

READ MORE

How to avoid a Bitcoin blackmail scam

How to avoid a Bitcoin blackmail scam “I know about the secret you are keeping from your wife and everyone else. You can ignore this letter, or pay me a $8600 confidentiality fee in Bitcoin”. It’s enough to send shivers down anyone’s spine, but these chilling words are part of a new scam targeting men. Here’s how it works. Scammers have been sending letters to men, demanding payments using bitcoin in exchange for keeping quiet about alleged affairs. The letter also explains how to use bitcoin to make the payment. This is a criminal extortion attempt to separate people from…

READ MORE

7 Simple Calendar Tricks That Will Level-up Your Team’s Productivity

7 Simple Calendar Tricks That Will Level-up Your Team’s Productivity used with permission from Microsoft What’s the secret to maximizing productivity and efficiency? There’s no single silver bullet, but one sure-fire way to make gains is with calendar tricks that will keep you organized and focused. From scheduling “no meeting” time blocks to integrating mobile so you never miss a meeting—the art of calendar optimization is crucial. Simple Calendar Tricks Here are seven simple calendar tricks you can use to bring your productivity to the next level: Schedule “no meeting” time blocks—Instead of multitasking, set aside time without interruptions. “When people multitask,…

READ MORE

10 of the latest Microsoft Teams integrations to help you work smarter, not harder

We built Microsoft Teams as a platform to bring together all of your workplace tools, apps, and services—whether or not we built them—to allow you to deliver better workday flow for you and your employees. A lot of you recognize the power of Teams, and you’ve been asking how to use Teams to its full advantage. Look no further. Today, we’re sharing ten of the latest Teams integrations you can use every day to simplify workflows, refocus your attention, and get back to working smarter—not harder. This is something our CEO, Satya Nadella, recently addressed in his interview on the future…

READ MORE

Keep Your Business Secure with an Up-To-Date Firewall

Keep Your Business Secure with an Up-To-Date Firewall The UK phone and broadband company TalkTalk was recently hacked by a seventeen-year-old, compromising 157,000 data pieces. The total bill? Around $49 million dollars. As technology progresses, cyber-attacks are largely becoming the norm in business. Small businesses are far from immune to such threats—a recent report showed that three in five cyber-attacks targeted small and mid-sized businesses, who oftentimes make themselves vulnerable by not dedicating the requisite staff or budget to their internet security. A secure firewall is a key defense against cyber attacks. It’s imperative that your business remains current with…

READ MORE

Multiple Computer Monitors: Advantages and Disadvantages

Multiple Computer Monitors: Advantages and Disadvantages used with permission from SBA.gov by Anita Campbell Are you looking to increase productivity in your small business? Some entrepreneurs and professionals find it helpful to have access to multiple computer monitors. This type of setup can potentially improve collaboration, productivity and even location flexibility. But there are also some potential drawbacks, from money and space constraints to the potential for distractions. If you’re considering investing in dual monitors for your own office, here are some of the pros and cons to consider. Pros of Using Multiple Computer Monitors Easy Switching Between Programs As…

READ MORE

Common-Sense Security Tips to Detect Scammers

Common-Sense Security Tips from Fran Blanco In the last two days I received two scam calls. It’s not surprising. Indeed, Experian reports that in 2018, there were 47,567 scams added to the Better Business Bureau (BBB) Scam Tracker℠, a 5% increase over 2017. Hopefully, with a few common-sense security tips, you’ll be prepared to detect scammers and protect your personal identity and funds. Scam Calls Detected The first scam call, on my personal cell, came from the “Social Security Administration.” The caller thinly masked a widespread scheme to extort funds. I quickly saw it coming, so I toyed with the…

READ MORE

5 Ways to Calculate ROI from Automated Account Provisioning and Deprovisioning

By Davin Cooke, Director of Business Development, Identity Maestro User management has become a critical issue. As physical and cloud-based IT systems and environments become increasingly complex so has account provisioning. This is due to multiple factors such as disconnected legacy applications, stricter compliance regulations, and the ever-present risk of data breaches through compromised passwords. Most businesses are looking for ways to improve Identity Management and reduce costs while enhancing compliance and security. There are five ways your organization will save by refreshing your user account provisioning processes. These include savings from: More efficient automated processes Requiring less user training…

READ MORE