Our Email Remains a Major Cybersecurity Vulnerability

This past week, we witnessed a major phishing attack via Google Docs. It spread quickly and affected over a million users in only a matter of hours. Investigators are still trying to determine the goal of the attack. While we don’t expect a major issue in the future as a result, this type of attack indicates a big problem. So many users …

Botnet Attacks Pose Growing Data Security Threat

You may have top-notch firewall, up-to-date antivirus, and the strongest security measures money can buy, but you’re probably not accounting for the data security threats that you thought were making your life easier. There’s a whole world of internet-connected devices, like cell phones, thermostats, door locks, security cameras, even printers, that are putting your data at risk because they don’t …

2017: The Worst Year Yet for Network Security

The threats to our network security continue to grow. 2016 showed us that there are plenty of new types of attacks to worry about, like ransomware, and all indicators show that there are plenty more on the horizon. The biggest problem in 2017 is that while we have continued to tack on new defenses, our underlying IT environment is eroding …

Top 3 Threats to Your Network Security

There is one assumption you must always make when it comes to protecting your network security: I am under attack, always. Never assume you can fly under the radar because your business is smaller than your competitors. You may be the exact target a cybercriminal is looking for; a victim who thinks they don’t need all the security measures of their larger counterparts. Below are the …

Presidential Race Proves Importance of Cybersecurity

Election season is finally coming to a close. Regardless of who you’re voting for, I’m pretty sure you’re as ready to be done with debates and political ads as I am. There have been endless arguments about which side is right on a range of issues. But, there is one issue that has come up across both parties and in …

Prevention Is Key to Protecting Your Network from Cyber Attacks

You read about new cyber attacks every day, but how concerned should you be? It hasn’t happened yet, so you’re probably not on the criminal radar right? Wrong. According to one report, “there are 34,529 known computer incidents per day in the U.S.” That is just known incidents. There are a huge amount that go unreported. Statistics like that should incite fear in …

5 Tips to Establishing a Secure BYOD Policy

‘Normal office hours’ are becoming a thing of the past. Your team is accessible almost anytime and anywhere, and your clients are reaping the benefit. The use of mobile devices, especially smartphones, in the workplace has skyrocketed. Businesses are reporting improved collaboration of dispersed teams, increased productivity overall, and reduced costs to the business by allowing mobile devices to be …

3 Possible Developments from the Internet of Things

Expectations are growing rapidly for the potential impacts the Internet of Things (IoT) will have on the world. All manner of sensor laden devices designed to directly integrate the physical world into computer-based systems open up a world of opportunity, and a fair amount of risk as well. Companies are producing new, network-ready tech at a staggering rate, but not …

Network Security Under Attack! But, By Who???

This isn’t another ‘CLOUD BLOG FROM BRETT,’ but hopefully it will give you a little more insight as to whether your organization is safe from the BAD PEOPLE…  I want to make sure you understand that going to the cloud doesn’t necessarily provide you with an automatic secure environment for your infrastructure, but it helps the cause. Here are some …

Is Your Staff a Threat to Your Network Security?

Network intrusions, identity theft, hacking and malware are all serious cyber crimes any business must be aware of. You’re smart, you’re prepared. You’ve meticulously planned to keep your internal network safe from external intruders. But your threats may already be in the office, on your payroll.  Your employees may not be as well versed in the ways of cyber attackers …