How to Train Your Team Against Phishing Attacks

Hackers are experts at their craft and always on the lookout for innovative ways to breach a network and extract private information. They cleverly mimic the company's own sites, for instance when hackers built an exact copy of a large local hospital's website.

Read more 2 Comments

Want Repeat Business? Protect the Customer’s Data

Ask most CEOs how they get new customers, and “referrals” will be in the top three. How do you get referrals? Earn the trust of your customers, and they will tell their friends about you. On the other hand, if you lose that trust, customers will not only leave, but they’ll also tell their friends why.

7 Ways to Shop Safer Online

Each year, Black Friday and Cyber Monday are expected to be a shopper’s paradise with the biggest discounts available from almost every retail store, in-store and online. With more than 4 billion internet users currently worldwide, it is also a hacker’s dream to target the expected two biggest online shopping days.

How to Know When Your Data Enters the Dark Web

The breach of as many as 90 million Facebook accounts is bad news for the social media company, but it’s even worse news for the users whose sensitive personal data was compromised. That’s because hackers won’t make their money by posting an embarrassing status update or “liking” Nickelback on your profile.

What the Facebook Security Breach Means for the Rest of Us

Facebook has been under fire for a while because of its handling of user data, and its recent security breach has only amplified public scrutiny. It’s the biggest in the company’s history, and has implications that reach far beyond the potential 90 million compromised accounts.

Read more 2 Comments

Featured on Due – 4 Strategies to Avoid Costly Credential Stuffing

Cybersecurity threats are becoming more prevalent each year, and business owners need to focus on protecting their companies and upgrading their defenses. Companies that use the internet to do business are especially at risk for credential stuffing, a tactic wherein botnets attempt to use fraudulent login data to access information.

IT Horror Stories – Law Firm Liability

Imagine that you are the Managing Partner of a large law firm. One day in the middle of a big case, one of your attorneys is complaining about not being able to access an important case file on the network. A call into your outsourced IT Company and a scan through their computer verifies that there is in fact, an issue.

IT Horror Stories – The Hacked Financial Services Server

What would you do if you were running a financial services firm and discovered that one of your employees had clicked on an innocent looking email that turned out to be malicious (also known as email phishing) and now your cloud servers, and potentially all of your client-related information was exposed and potentially encrypted by an unknown hacker?  Sound like a nightmare scenario?  Well, that was the state for one local company until we were able to step in to help.

If You’re Considering Hosting Your Operation on Vendor Servers (AKA the Cloud), Ask Yourself These 5 Questions

Deciding between hosting information on an internal server or an external one (the cloud) can be difficult, even for technically savvy owners. Many factors make the decision personal and specific not only to each industry, but also to each company and office.

How To Spot Phishing Attempts Before You’re On The Hook – Thinking Bigger

As seen in Thinking Bigger Business Media edition and written by Jon Schram.

In the security world, it seems like every day brings another story of customer data being compromised. One of the latest examples comes from Children’s Mercy Hospital, where patients are still finding their data endangered after an email phishing scam hit more than 60,000 individuals back in January.