Cyber-security

Home » Cyber-security

7 Coronavirus related scams targeting your business

By |2020-06-11T13:37:38+00:00May 11th, 2020|Cyber-Security, Safety and Cyber Security|

We’ve warned consumers about Coronavirus related scams, but businesses are at risk, too. Keep your guard up against these seven B2B scams that try to exploit companies’ concerns about COVID-19. In addition to sharing this information with your employees and social networks, read on for how you can report Coronavirus scams to the FTC. Coronavirus related scams: "Public Health" Scams Fraudsters are sending messages that claim to be from the Centers for Disease Control and Prevention (CDC), World Health Organization (WHO), or other public health offices. They may ask for Social Security numbers, tax IDs, etc. Other variations direct you to

Comments Off on 7 Coronavirus related scams targeting your business

COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

By |2020-06-11T13:49:00+00:00April 23rd, 2020|Cyber-Security, Safety and Cyber Security|

Since the COVID-19 pandemic began, cybercrime has increased by up to 300%. According to cyber security experts, a big part of that increase has come in the form of COVID-19 phishing scams. Now more than ever, organizations must remain hyper-vigilant to protect assets and employees from attack. With many employees working from home (WFH), everyone appears to be a target. With expanded security perimeters, reports of phishing attacks are way up, even within our own organization. Current COVID-19 Phishing Scams The most common COVID-19 phishing scams involve the sinister but effective method of spoofing authoritative sources. Often-spoofed organizations include the

Comments Off on COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

Coronavirus Phishing Attacks Target Remote Workers

By |2020-06-12T10:32:00+00:00March 24th, 2020|Cyber-Security, Safety and Cyber Security|

Spurred by social distancing orders, the American workforce is returning home. In fact, Netskope Threat Labs reports that 58 percent of users worked remotely last week. This compares with an average of 27 percent prior to the pandemic. Unfortunately, researchers have also recorded a corresponding spike in coronavirus phishing attacks. Cyber criminals love a crisis, from terror attacks to natural disasters. Using emotional appeals and a sense of urgency, they trick users into surrendering sensitive information or unknowingly downloading malware. And most of the time, they use email to launch the attack. Remote Work Raises the Risk While advances in

Comments Off on Coronavirus Phishing Attacks Target Remote Workers

Advancements in Data Encryption Up the Data Defense Game

By |2020-06-12T10:44:38+00:00March 5th, 2020|Cyber-Security, Data Compliance, Technology|

From credit card transactions to online loan applications and sensitive emails, billions of pieces of valuable information cross the internet every hour. Keeping that data safe from unauthorized access requires increasingly sophisticated tools. As the challenges to data security grow more intense, advancements in data encryption rise to meet them. In the movies, messengers transmitted important documents in a briefcase, handcuffed to the messenger’s wrist and accessible only via a key. The messenger made certain that no one tampered with the document during transit and that only the intended recipient opened the briefcase to retrieve and read its contents. Encryption

Comments Off on Advancements in Data Encryption Up the Data Defense Game

Cloud Security Tips to Ease the Transition from GroupWise to Office 365

By |2020-06-01T09:41:08+00:00November 13th, 2019|Office 365 and Migration, Safety and Cyber Security|

Reports of the state of business cloud security in 2019 show a good news/bad news scenario. The good news for GroupWise users contemplating a move to the cloud and possibly Office 365? Specifically, security offerings have improved. In addition, most cloud service providers stay on top of infrastructure security. In fact, none of the high-profile breaches of 2018 resulted from cloud service provider negligence. The bad news? Organizations have largely failed to keep pace with emerging security technologies. For example, misconfiguration ranks a close second to credential hijacking as the most common cause of security breaches. Less than half of

Comments Off on Cloud Security Tips to Ease the Transition from GroupWise to Office 365

Minimize Risk with Effective Cyber-Security Training

By |2020-06-01T10:13:03+00:00September 3rd, 2019|Safety and Cyber Security|

Effective cyber-security training tips from Dena Kamel You can (and should) install firewalls and antivirus, define email filters and policies and even deploy advanced threat detection. But if you fail to fully address human error, you have missed the most vulnerable aspect of information security. The solution lies in delivering effective cyber-security training, a goal that can prove difficult to achieve. Employees inadvertently create security problems by using weak passwords, clicking malicious links, failing to properly delete data and ignoring other basic rules of data protection. Providing ongoing, engaging and pertinent training can potentially save your organization millions of dollars

Comments Off on Minimize Risk with Effective Cyber-Security Training

Microsoft Active Directory Management to Control Access and Boost Security

By |2020-05-22T05:00:05+00:00July 23rd, 2019|Safety and Cyber Security|

Active Directory management tips from Ross Phillips A small to medium-sized business may include hundreds of employees and thousands of devices. Microsoft Active Directory (AD) provides an indispensable method for identifying those resources and managing access within the system. In organizations with data in the cloud, Azure AD provides a similar service for cloud-based servers and applications such as Office 365 for business. Active Directory and Azure AD form the core of an organization’s information technology (IT) environment. Tapping into the full capabilities of these tools requires Windows PowerShell, a command-line shell and scripting environment. While PowerShell is essential to

Comments Off on Microsoft Active Directory Management to Control Access and Boost Security

4 Essential Steps to Cloud Computing Security

By |2020-05-13T08:51:48+00:00April 10th, 2019|Safety and Cyber Security|

Tips for cloud computing security from Greg Smith Congratulations! Your organization made the leap to the cloud. Employees from multiple offices are collaborating with ease. Your data is safe from fires and floods. And with reduced need to maintain costly data centers, you have adjusted your IT budget to explore new areas of innovation. But before you celebrate, be sure you have addressed cloud computing security. The collaborative benefits of the cloud also bring significant risks. Without specific controls, sensitive business and customer data may make its way into unauthorized hands, risking both intellectual assets and organizational image. Make cloud

Comments Off on 4 Essential Steps to Cloud Computing Security

Defense in Depth Strategy Secures Vital Information Assets

By |2020-04-30T01:02:48+00:00March 28th, 2019|Safety and Cyber Security|

Defense in Depth security tips from Ross Phillips From proprietary formulas to customer data, information is the life blood of an organization. Keeping that information secure in an age of ever-evolving cyber-threats can present a challenge. Maintaining multi-layer security, or defense in depth, must become a strategic priority for any organization. Start with prevention. The majority of cyber-security attacks would never occur if organizations kept current on patches. Add in regular security audits and a comprehensive defense in depth strategy that includes physical, technical and administrative controls. For smaller organizations, take advantage of security options provided with Office 365. Patch

Comments Off on Defense in Depth Strategy Secures Vital Information Assets