Your Identity Theft Playbook

The United States suffers identity theft at more than twice the rate of the world average. According to a recent survey, identity theft has struck an astonishing 33 percent of US citizens. And, while thieves certainly prey on the elderly, the majority of victims are younger. Consequently, identity theft poses a risk not only for the victim, but for their places of business. Consider the risk when high-level employees have their identities stolen. Not only can thieves wipe out their bank accounts, but they can use stolen credentials to gain access to privileged information. Individuals and businesses both need to…

READ MORE

How to Know If Your Phone Has Been Hacked

Smartphones have revolutionized our personal and business lives. We socialize on phones, take endless photos, use them to close deals, find restaurants, organize our schedules, and deposit checks. But all that power and flexibility brings inherent risks. Protect yourself by recognizing the signs that indicate your phone has been hacked. Know the Hacker Playbook Individuals can gain access to your phone and its data in a variety of ways. Understanding their methods will help you keep bad actors out. For instance, hackers may access your phone by: Direct access – With direct access to your phone, a hacker can install…

READ MORE

Law Firm Mobile Security Best Practices

Like most businesses, law firms have seen an increased mobile workforce in recent years. Mobile access increases employees’ ability to communicate with clients and coworkers quickly, as well as access documents on the run. But it also raises security concerns. Incorporate law firm mobile security best practices to protect sensitive business and client data. 1. Employ Mobile Device Management (MDM) The industry offers a host of MDM options to help your law firm get a handle on mobile security. Choose an MDM system that allows you to specify which devices can access the network, as well as what applications they…

READ MORE

Expand Your Business with Remote Desktop Services (Formerly Terminal Services)

Microsoft Remote Desktop Services is one of those amazing technologies that often triggers a first response like, “I wish I’d heard about this sooner!” Why so terrific? Because, this nifty business tool enables users to access their Windows desktops and applications from anywhere on the Internet, or from within a business network. If you don’t recognize it, it’s because many know the product by its former name, Terminal Services. The popular Microsoft remote access technology enables a secure connection and a rich desktop experience. Thus, it looks and works just like your Windows desktop or application is right there in…

READ MORE

Shadow IT and BYOD—Conquering These Corporate Cousins

Keeping Up with Business Needs and Devices Shadow IT is a dreaded aspect of cyber security. It is a world in which employees use services such as their private computer or, say, an iPad, to do their work without having obtained corporate approval. Standard Information Security protocols should apply to Shadow IT but because the devices are personal, enforcement is difficult. Shadow IT, when used across an enterprise, strongly illustrates that The company lacks up-to-date cyber resources; The company is unable to cope as requirements change for various departments; The IT infrastructure isn’t flexible enough to cover evolving business needs….

READ MORE

Should you ditch your desktop?

Desktops have supported your business and workforce for years. But with new developments (wireless docking) and new form factors (Ultrabooks, detachables, tablets), desktops are now just one of a number of viable options for businesses looking to replace their aging fleet and/or upgrade their existing capabilities. So the question is: desktops or mobile devices? Here are four questions to help you make the right decision for your needs. 1. Do you need to upgrade your PCs soon? While it’s nice to think ahead, you probably don’t want to replace your desktops while they’re still performing well and meeting your needs….

READ MORE

How to Protect your Business from a FREAK Attack

A recent NSA hack by researchers reveals a new network vulnerability that puts sensitive customer and business data at risk Recently a new type of hacker threat has come to light. The NSA had their thought-to-be-secure website compromised by researchers employing a FREAK attack to demonstrate how criminals might, with minimal effort, profit from the technique by stealing passwords, personal information and financial data. Hackers, now familiar with the technique, will be looking for susceptible targets. What is a FREAK attack? FREAK stands for Factoring RSA Export Keys. It’s a way of forcing a lower level of encryption on a…

READ MORE