Online security tips for working from home

Teleworking during the Coronavirus outbreak? While working from home can help slow the spread of the virus, it brings new challenges: juggling work while kids are home from school; learning new software and conferencing programs; and managing paper files at home. As you’re getting your work-at-home systems set up, here are some tips for protecting your devices and personal information. Start with cybersecurity basics. Keep your security software up to date. Use passwords on all your devices and apps. Make sure the passwords are long, strong and unique: at least 12 characters that are a mix of numbers, symbols and capital and…

READ MORE

Close the Door to Hackers by Purging Weak Passwords

Marriott, Target, Home Depot and others have made headlines in recent years for data breaches that affected millions of customers. But did you know that 43 percent of breaches hit small businesses? Limited resources and lack of expertise often leave security gaps in smaller organizations, compounded by weak passwords and other risky practices. For instance, in the Target attack, hackers stole credentials from a much smaller company in the retailer’s supply chain. They then used the stolen credentials to access Target’s network. Sadly, similar scenarios play out over and over again. And users make the job much easier for criminals…

READ MORE

Stop Abbreviating 2020 and Essential Tech Tips for the New Year

While you work on those resolutions to eat right and exercise, make a few resolutions for your business, as well. A fresh year presents the perfect opportunity to tighten security and run some much-needed maintenance. Protect your business with these basic tech tips for the new year. 1. Stop Abbreviating 2020 Commit now to writing out all four digits of the year. Writing “20” instead of “2020” leaves the door open for fraudsters. For example, suppose you sign a credit contract with the date 1/27/20. A bad actor could change the date to 1/27/2019 and attempt to collect an additional…

READ MORE

Gone Phishing: How to Be Safe from Personalized Spear Phishing Attacks

Phishing attacks entered the scene when AOL still ruled the Internet. More than two decades later, cyber criminals continue to use targeted phishing techniques for one simple reason. They work. Specialized attacks, known as spear phishing, use personal details to trick victims into clicking malicious links or sending sensitive information. For example, last year, hackers compromised the email system for an Ohio parish. After spying on email conversations, they posed as a construction company hired to complete parish renovations. Soon, the parish received an email, supposedly from the contractor, listing new instructions for payment transfer. In response, they paid nearly…

READ MORE

Seven cybersecurity tips for 2020

Seven cybersecurity tips for 2020 Used with the permission of http://thenetwork.cisco.com by Kevin Delaney Security experts share their predictions, warnings, and best practices for the coming year. 2020 promises a wave of technology change that will further transform the enterprise — and our very lives — in profound ways. But that inclusive, sustainable, and productive future demands a far-reaching commitment to cybersecurity. In 2019, there was no shortage of damaging, heavily publicized security breaches. And given the ever-increasing sophistication of cybercriminals — and the mounting complexity facing the defenders — the threat landscape in 2020 promises all-new challenges. So how…

READ MORE

7 Cyber Security Best Practices Every Business Should Implement

During 2019, cyber criminals attacked thousands of businesses. Half of those attacks targeted small businesses, many of which rely on outdated systems and insufficient security. Those businesses lost millions of dollars, as well as the confidence of their customers. While cyber attacks pose an increasingly serious threat, cybersecurity best practices mitigate the danger. Businesses that invest in cybersecurity initiatives realize the benefits of protecting vital assets and maintaining a critical business reputation. With the help of an experienced technology partner, use these seven steps to begin building the fortress you need to defend against cyber crime. 1. Create an Acceptable…

READ MORE

How to Fight Formjacking and Win Back the Holiday Shopping Season

The 2018 holiday season brought a new kind of Grinch. Late in the year, Symantec revealed that hackers had begun to employ a nearly invisible new tactic called formjacking. According to the Internet Security Threat Report, Symantec blocked nearly four million formjacking attacks in 2018. One third of those attacks occurred during November and December. Remember ATM skimmers that steal credit card information when you swipe your card? Think of formjacking as the online version of skimming. Hackers infect an online order form with malicious JavaScript. Then, when you enter your card information to make a purchase, the code transfers…

READ MORE

3 Steps to Effective Local Government Cyber Security

Four years ago, the city of Atlanta launched a smart city initiative, hoping to improve municipal operations with integrated technology. The future looked bright. And then, in 2018, a ransomware attack crippled city infrastructure. One year and $17 million dollars later, Atlanta serves as a reluctant poster child for the necessity for robust local government cyber security. Anatomy of a Cyber Attack In 2019 alone, local governments and hospitals in the United States have reported 140 cyber-attacks. In fact, cyber-attacks have more than doubled since last year. These assaults have destroyed public records, disrupted healthcare and law enforcement and frozen…

READ MORE

3 Steps to Effective Cloud Security for Business

According to a recent report from Symantec Corporation, business organizations have transferred over half of their workload to the cloud. With huge benefits in terms of scalability and collaboration, the move makes good business sense. But those benefits come with risks. Business leaders must take a proactive approach to achieve effective cloud security that protects critical business assets. Effective Cloud Security: Complex Environment Creates Unique Challenges While the vast majority of organizations operate in the cloud to some degree, the nature of that cloud usage varies widely. Some businesses access specific software applications in the cloud while storing data on-premises….

READ MORE

Ecommerce Cyber Security 101 to Protect Your Small Business

Think like a thief. Picture a store left poorly secured, valuable merchandise easily accessible using minimal tools under cover of darkness. Now, imagine a digital storefront with weak security controls and thousands of financial records ripe for the picking. Hackers love small businesses, but you can stop them in their tracks with robust ecommerce cyber security. According to cyber security firm Kaspersky, 48 percent of small to medium businesses have experienced data breaches this year. That means the exposure of financial and personal data for thousands of customers. And it means a payday for hackers who sell that information on…

READ MORE