With cybersecurity scams around every corner – can you afford to wait?

Unless you’ve been living off the grid, you’ve probably heard about the exploding number of cybersecurity threats popping up everywhere. And it’s not just global statistics we’re talking about. Even state and local governments are coming under assault. Baltimore is the latest US city targeted with a ransomware attack, following smaller security beaches in towns like Greenville, NC, and Allentown, …

Is Your Business Compliant With Cybersecurity Laws?

Cybersecurity used to be considered “an IT issue.” Keeping data and files safe was the domain of the CIO, and no one else paid much attention as long as operations were running smoothly. Because data has become an enormous business driver for all types of companies, and cybersecurity laws have become stricter and more specific to address the growing risks …

5 Pillars of Business Continuity

Your business runs on data. If you lose access to it, you immediately incur costs – costs in time, productivity, customer dissatisfaction. If you lose it completely, the costs could be catastrophic. Threats come in many forms and you rarely see them coming. To combat this potential for disaster, you need a thorough backup plan ready in the wings. Here …

Hacker Convention Warns: Don’t Allow Your Network to Be “Faxploited”

There are plenty of access points for a hacker, and they’re often tied to our very high-tech devices – all the pieces of hardware with “smart” in front of them for one example. But sometimes our dinosaurs, the work-horse predecessors of our fast-paced IT, are the ones holding open a back door for security weaknesses. At Def Con 26, an …

5 Network Security Pitfalls Putting You at Risk

Security is rightfully at the forefront of most business owners’ minds. There are new breaches reported on every day and no size business, from major enterprise to SMB, is safe from being targeted. There are many options for hardware and software that provide protection, but a network security policy is just as critical. Many times, though, we find that these …

The Dangers of Outdated Technology

No machine is meant to last forever. Your refrigerator, your car, and your servers are all depreciating in value and efficiency the moment they leave the factory. Technology advances so quickly that older versions are quickly becoming outdated technology. But that legacy equipment didn’t come cheap and it’s hard to let go of something you’ve invested so much time and money. …

The 3 Perils of Your Cyber Security Process

It’s easy to understand why businesses are increasing their security budgets after a year like 2017. We’ve seen an unprecedented level of cyber crime, from Equifax to WannaCry. While the cyber crime stories made the headlines, there were no doubt even more losses that occurred as a result of simple human error, many of which were never reported. Many companies …

Trends in DDoS Attacks to Keep on Your Radar

There is an abundance of news relating to cybercrime and business in the last few years. Hackers are finding new ways to attack enterprises every day. While ransomware continues to grab headlines, Distributed Denial of Service (DDoS) attacks are becoming a major problem, too. DDoS is responsible for 22% of downtime reported in 2016, according to the Ponemon Institute. The costs …

A Solution for SMBs Looking for Protection from Cyber Crime

In the wake of the WannaCry attack, cyber security concerns have escalated, as they should. The statistics on data breaches are harrowing. SMBs represent more than 50% of data breaches. The National Cyber Security Alliance found that 60% of small companies are unable to sustain their businesses over six months after a cyber-attack. The proliferation of ransomware alone is astounding. In 2016, there were …