Close the Door to Hackers by Purging Weak Passwords

Marriott, Target, Home Depot and others have made headlines in recent years for data breaches that affected millions of customers. But did you know that 43 percent of breaches hit small businesses? Limited resources and lack of expertise often leave security gaps in smaller organizations, compounded by weak passwords and other risky practices. For instance, in the Target attack, hackers stole credentials from a much smaller company in the retailer’s supply chain. They then used the stolen credentials to access Target’s network. Sadly, similar scenarios play out over and over again. And users make the job much easier for criminals…

READ MORE

Stop Abbreviating 2020 and Essential Tech Tips for the New Year

While you work on those resolutions to eat right and exercise, make a few resolutions for your business, as well. A fresh year presents the perfect opportunity to tighten security and run some much-needed maintenance. Protect your business with these basic tech tips for the new year. 1. Stop Abbreviating 2020 Commit now to writing out all four digits of the year. Writing “20” instead of “2020” leaves the door open for fraudsters. For example, suppose you sign a credit contract with the date 1/27/20. A bad actor could change the date to 1/27/2019 and attempt to collect an additional…

READ MORE

Gone Phishing: How to Be Safe from Personalized Spear Phishing Attacks

Phishing attacks entered the scene when AOL still ruled the Internet. More than two decades later, cyber criminals continue to use targeted phishing techniques for one simple reason. They work. Specialized attacks, known as spear phishing, use personal details to trick victims into clicking malicious links or sending sensitive information. For example, last year, hackers compromised the email system for an Ohio parish. After spying on email conversations, they posed as a construction company hired to complete parish renovations. Soon, the parish received an email, supposedly from the contractor, listing new instructions for payment transfer. In response, they paid nearly…

READ MORE

Seven cybersecurity tips for 2020

Seven cybersecurity tips for 2020 Used with the permission of http://thenetwork.cisco.com by Kevin Delaney Security experts share their predictions, warnings, and best practices for the coming year. 2020 promises a wave of technology change that will further transform the enterprise — and our very lives — in profound ways. But that inclusive, sustainable, and productive future demands a far-reaching commitment to cybersecurity. In 2019, there was no shortage of damaging, heavily publicized security breaches. And given the ever-increasing sophistication of cybercriminals — and the mounting complexity facing the defenders — the threat landscape in 2020 promises all-new challenges. So how…

READ MORE

7 Cyber Security Best Practices Every Business Should Implement

During 2019, cyber criminals attacked thousands of businesses. Half of those attacks targeted small businesses, many of which rely on outdated systems and insufficient security. Those businesses lost millions of dollars, as well as the confidence of their customers. While cyber attacks pose an increasingly serious threat, cybersecurity best practices mitigate the danger. Businesses that invest in cybersecurity initiatives realize the benefits of protecting vital assets and maintaining a critical business reputation. With the help of an experienced technology partner, use these seven steps to begin building the fortress you need to defend against cyber crime. 1. Create an Acceptable…

READ MORE

How to Fight Formjacking and Win Back the Holiday Shopping Season

The 2018 holiday season brought a new kind of Grinch. Late in the year, Symantec revealed that hackers had begun to employ a nearly invisible new tactic called formjacking. According to the Internet Security Threat Report, Symantec blocked nearly four million formjacking attacks in 2018. One third of those attacks occurred during November and December. Remember ATM skimmers that steal credit card information when you swipe your card? Think of formjacking as the online version of skimming. Hackers infect an online order form with malicious JavaScript. Then, when you enter your card information to make a purchase, the code transfers…

READ MORE

3 Steps to Effective Local Government Cyber Security

Four years ago, the city of Atlanta launched a smart city initiative, hoping to improve municipal operations with integrated technology. The future looked bright. And then, in 2018, a ransomware attack crippled city infrastructure. One year and $17 million dollars later, Atlanta serves as a reluctant poster child for the necessity for robust local government cyber security. Anatomy of a Cyber Attack In 2019 alone, local governments and hospitals in the United States have reported 140 cyber-attacks. In fact, cyber-attacks have more than doubled since last year. These assaults have destroyed public records, disrupted healthcare and law enforcement and frozen…

READ MORE

3 Steps to Effective Cloud Security for Business

According to a recent report from Symantec Corporation, business organizations have transferred over half of their workload to the cloud. With huge benefits in terms of scalability and collaboration, the move makes good business sense. But those benefits come with risks. Business leaders must take a proactive approach to achieve effective cloud security that protects critical business assets. Effective Cloud Security: Complex Environment Creates Unique Challenges While the vast majority of organizations operate in the cloud to some degree, the nature of that cloud usage varies widely. Some businesses access specific software applications in the cloud while storing data on-premises….

READ MORE

Ecommerce Cyber Security 101 to Protect Your Small Business

Think like a thief. Picture a store left poorly secured, valuable merchandise easily accessible using minimal tools under cover of darkness. Now, imagine a digital storefront with weak security controls and thousands of financial records ripe for the picking. Hackers love small businesses, but you can stop them in their tracks with robust ecommerce cyber security. According to cyber security firm Kaspersky, 48 percent of small to medium businesses have experienced data breaches this year. That means the exposure of financial and personal data for thousands of customers. And it means a payday for hackers who sell that information on…

READ MORE

Common-Sense Security Tips to Detect Scammers

Common-Sense Security Tips from Fran Blanco In the last two days I received two scam calls. It’s not surprising. Indeed, Experian reports that in 2018, there were 47,567 scams added to the Better Business Bureau (BBB) Scam Tracker℠, a 5% increase over 2017. Hopefully, with a few common-sense security tips, you’ll be prepared to detect scammers and protect your personal identity and funds. Scam Calls Detected The first scam call, on my personal cell, came from the “Social Security Administration.” The caller thinly masked a widespread scheme to extort funds. I quickly saw it coming, so I toyed with the…

READ MORE