How to Train Your Team Against Phishing Attacks

How to Train Your Team Against Phishing Attacks

One of the ways the Occupational Safety and Health Administration protects workers from physical harm is mandatory annual training. No matter how much you roll your eyes, OSHA requires that training is updated every year because new tools are always being introduced and because it's all too easy to lapse into complacency.

7 Ways to Shop Safe on Black Friday and Cyber Monday

7 Ways to Shop Safe on Black Friday and Cyber Monday

Black Friday and Cyber Monday are expected to be a shopper’s paradise with the biggest discounts of the year available from almost every retail store, in-store and online. With more than 4 billion internet users worldwide, it is also a hacker’s dream to target the expected two biggest online shopping days of 2018.

Malicious cybercriminals live for the opportunity to take advantage of the influx of purchasing and steal credit card data or private information.

How to Know When Your Data Enters the Dark Web

How to Know When Your Data Enters the Dark Web

The breach of as many as 90 million Facebook accounts is bad news for the social media company, but it’s even worse news for the users whose sensitive personal data was compromised. That’s because hackers won’t make their money by posting an embarrassing status update or “liking” Nickelback on your profile.

Featured on Due – 4 Strategies to Avoid Costly Credential Stuffing

Featured on Due – 4 Strategies to Avoid Costly Credential Stuffing

Cybersecurity threats are becoming more prevalent each year, and business owners need to focus on protecting their companies and upgrading their defenses. Companies that use the internet to do business are especially at risk for credential stuffing, a tactic wherein botnets attempt to use fraudulent login data to access information.

IT Horror Stories – Law Firm Liability

IT Horror Stories – Law Firm Liability

Imagine that you are the Managing Partner of a large law firm. One day in the middle of a big case, one of your attorneys is complaining about not being able to access an important case file on the network. A call into your outsourced IT Company and a scan through their computer verifies that there is in fact, an issue.

IT Horror Stories – The Hacked Financial Services Server

IT Horror Stories – The Hacked Financial Services Server

What would you do if you were running a financial services firm and discovered that one of your employees had clicked on an innocent looking email that turned out to be malicious (also known as email phishing) and now your cloud servers, and potentially all of your client-related information was exposed and potentially encrypted by an unknown hacker?  Sound like a nightmare scenario?  Well, that was the state for one local company until we were able to step in to help.

The Best Ways to Begin a Server Backup

The Best Ways to Begin a Server Backup

When we ask business owners whether their data is backed up, we generally get two responses. Ten percent of the time, they have no idea. The other 90 percent of the time, they think for a moment and then say, “I think so.” The lack of confidence blows us away because backups are about so much more than a company’s data.

How To Spot Phishing Attempts Before You’re On The Hook – Thinking Bigger

How To Spot Phishing Attempts Before You’re On The Hook – Thinking Bigger

As seen in Thinking Bigger Business Media edition and written by Jon Schram.

In the security world, it seems like every day brings another story of customer data being compromised. One of the latest examples comes from Children’s Mercy Hospital, where patients are still finding their data endangered after an email phishing scam hit more than 60,000 individuals back in January.

The Purple Guys featured in Forbes Magazine for Cybersecurity

The Purple Guys featured in Forbes Magazine for Cybersecurity

Every Piece of Data is Valuable to Hackers
Almost every attack at banking and financial institutions is aimed at financial gain. Some are direct, such as the ATM and account hacks noted earlier, but others are more indirect. For instance, the PT report showed that malware attacks increased by 75 percent during the last year, collecting information such as account logins, answers to security questions, Social Security numbers, and more.

How to Protect Your Web Application – Even if You Don’t Own Sensitive Data

How to Protect Your Web Application – Even if You Don’t Own Sensitive Data

(As featured on Business.com)

Hackers are watching. Give your employees the knowledge and tools they need to avoid puncturing holes in your system. Prioritize these four critical security measures.

The hacking attacks on Equifax and Panera, less than a year apart, were highly publicized events.