Security
How to Build a Small Business Network Security Plan
For 2019, the global average cost of a data breach is $3.92 million. Can your company afford to lose that much? Probably not. In fact, 60% of small businesses close their doors within 6 months after a cyberattack. It may seem like a scary statistic, but the fact is, you can prevent this from happening to your business…
Read MoreKeeping Your Zoom Meetings Safe from Zoom-bombing
Since the Coronavirus pandemic has much of the world sheltering in place, thousands of small businesses and companies are using popular videoconferencing services like Zoom. Unfortunately, as the popularity of Zoom has grown sharply, attacks called “Zoom-bombing” have grown at a commensurate rate. Zoom-bombing involves unauthorized parties gaining access to your Zoom meetings to harass…
Read MoreWhat can IT do about the CoronaVirus?
I want to preface this post by saying that the CoronaVirus is a horrible disease that’s having a devastating impact on not only individuals and families but entire communities, regions, and industries. Our hearts and prayers are with everyone impacted and we hope this problem is resolved quickly. With that said, CEO’s and Business Owners…
Read MoreData Privacy in 2019, did we learn anything from Cambridge Analytica?
It seems so long ago. When Cambridge Analytica first entered the realm of public consciousness, last year, it was as a shady marketing company that may or may not helped to elect the next President of the United States through illegal means. At the time, it seemed like a breakthrough moment in data privacy. A…
Read MoreIs Coffee Shop or Hotel Wi-Fi Safe? 8 Tips to Stay Safe on Public Wi-Fi
Public WIFI networks are extremely convenient and found almost everywhere. Whether you are stepping out of the house or office to a coffee shop, mall, airport, or retail store, you are assured of free WIFI. The availability of public WIFI networks has led to an increase in the time people spend online. A quick question;…
Read MoreSocial Engineering, Whale Phishing, Spearphishing? Avoid Being a Victim
In 1992, Kevin Mitnick was the most wanted hacker in the United States. It didn’t stop him. He wanted to hack his phone so the cops couldn’t track it. This ended up with him going after the source code, which he obtained with just a few phone calls. So-called social engineering remains, nearly thirty years…
Read MoreHow to Address the Threats that BYOD Brings to Your Business
BYOD, short for bring your own device, is a rapidly expanding business trend. The industry is expected to triple in revenue within the next 5 years, as more than half the global workforce will be mobile during that same timeframe. It’s a natural development. We’re less bound by location in working for our employers, and…
Read MoreGaining Visibility into Shadow IT: The Case of NASA JPL
What comes to your mind when you hear the term ‘Shadow IT?’ For some people, they first think about Ra’s al Ghul’s League of Shadows –formerly referred to as League of Assassins- in the film Batman. This answer is not far from the truth because Shadow IT is an assassin targeting organizations with huge adverse…
Read More3 Pillars of Email Authentication: SPF, DKIM, and DMARC
Since the advent of the internet, spam mail has been on the rise. 45% of emails sent are spam emails equating to about 14.5 billion spam emails daily. Many businesses and individuals fall victim to spam emails every day. Spam Email has adverse effects including increasing security breaches, decreasing productivity, and huge financial repercussions. The…
Read MoreZero-Day Zoom Webcam Vulnerability targeting Apple Macs announced
Apple Macbooks and iMacs have been long praised for their built-in security features and access restrictions, unfortunately, the software you install on your Macbook, not so much! Yesterday, Jonathan Leitschuh provided a post on Medium, the popular blog aggregation service, about a zero-day vulnerability in Zoom’s Conferencing software the opens your Apple MacOS computer to…
Read More