A Solution for SMBs Looking for Protection from Cyber Crime

In the wake of the WannaCry attack, cyber security concerns have escalated, as they should. The statistics on data breaches are harrowing. SMBs represent more than 50% of data breaches. The National Cyber Security Alliance found that 60% of small companies are unable to sustain their businesses over six months after a cyber-attack. The proliferation of ransomware alone is astounding. In 2016, there were …

Our Email Remains a Major Cybersecurity Vulnerability

This past week, we witnessed a major phishing attack via Google Docs. It spread quickly and affected over a million users in only a matter of hours. Investigators are still trying to determine the goal of the attack. While we don’t expect a major issue in the future as a result, this type of attack indicates a big problem. So many users …

Botnet Attacks Pose Growing Data Security Threat

You may have top-notch firewall, up-to-date antivirus, and the strongest security measures money can buy, but you’re probably not accounting for the data security threats that you thought were making your life easier. There’s a whole world of internet-connected devices, like cell phones, thermostats, door locks, security cameras, even printers, that are putting your data at risk because they don’t …

2017: The Worst Year Yet for Network Security

The threats to our network security continue to grow. 2016 showed us that there are plenty of new types of attacks to worry about, like ransomware, and all indicators show that there are plenty more on the horizon. The biggest problem in 2017 is that while we have continued to tack on new defenses, our underlying IT environment is eroding …

Top 3 Threats to Your Network Security

There is one assumption you must always make when it comes to protecting your network security: I am under attack, always. Never assume you can fly under the radar because your business is smaller than your competitors. You may be the exact target a cybercriminal is looking for; a victim who thinks they don’t need all the security measures of their larger counterparts. Below are the …

Presidential Race Proves Importance of Cybersecurity

Election season is finally coming to a close. Regardless of who you’re voting for, I’m pretty sure you’re as ready to be done with debates and political ads as I am. There have been endless arguments about which side is right on a range of issues. But, there is one issue that has come up across both parties and in …

Prevention Is Key to Protecting Your Network from Cyber Attacks

You read about new cyber attacks every day, but how concerned should you be? It hasn’t happened yet, so you’re probably not on the criminal radar right? Wrong. According to one report, “there are 34,529 known computer incidents per day in the U.S.” That is just known incidents. There are a huge amount that go unreported. Statistics like that should incite fear in …

5 Tips to Establishing a Secure BYOD Policy

‘Normal office hours’ are becoming a thing of the past. Your team is accessible almost anytime and anywhere, and your clients are reaping the benefit. The use of mobile devices, especially smartphones, in the workplace has skyrocketed. Businesses are reporting improved collaboration of dispersed teams, increased productivity overall, and reduced costs to the business by allowing mobile devices to be …

3 Possible Developments from the Internet of Things

Expectations are growing rapidly for the potential impacts the Internet of Things (IoT) will have on the world. All manner of sensor laden devices designed to directly integrate the physical world into computer-based systems open up a world of opportunity, and a fair amount of risk as well. Companies are producing new, network-ready tech at a staggering rate, but not …

Network Security Under Attack! But, By Who???

This isn’t another ‘CLOUD BLOG FROM BRETT,’ but hopefully it will give you a little more insight as to whether your organization is safe from the BAD PEOPLE…  I want to make sure you understand that going to the cloud doesn’t necessarily provide you with an automatic secure environment for your infrastructure, but it helps the cause. Here are some …