How to get the most out of Office 365

While many Office 365 users know the service can boost their company’s productivity, many aren’t utilizing it to its full potential. There are several key principles and tips that can make the service even more productive. So to help you get the most out of Office 365, here are some tips to follow. Get all […]

Tips on Windows 10 privacy protection

Long gone are the days where private information (like vault combinations and the name of your high school crush) are kept confined within a padlocked journal. Speculation has been circulating that Windows 10 gathers more info than it should. Whether or not you think privacy lines have been breached, here are some tips to protect […]

The Importance of Disaster Recovery

Most business owners don’t normally think they will be a victim of a natural disaster…not until an unforeseen crisis happens and their company ends up suffering from thousands or millions of dollars in economic and operational losses — all because of the lack of thoughtful disaster preparedness. This post gives small or mid-sized businesses (SMBs) […]

Security tips for the small business

It’s been said so many times that many small business owners are likely to block it out, but the truth remains: cyber criminals target SMBs. Perhaps the reason for this ignorance is that when an SMB falls victim to an online attack, it’s not breaking news. But this time, in a recent NY Times article, […]

The curse of Chimera ransomware

There are numerous strains of malware out there, but one particularly unpleasant one is ransomware. While this malicious software has been around for some time, recently a newer, nastier upgrade was discovered. Posing a threat to businesses of all sizes, the program, called Chimera, has upped the ante when it comes to scaring its victims […]

Twitter warns about cyber attacks

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been […]

Google and the art of safe mobile browsing

With the vast majority of end users turning to Google as their search engine or default browser of choice, it comes as no surprise to learn that the company takes security seriously. But in a perpetually changing landscape where anti-virus and anti-malware tools are constantly chasing their tails in order to stay up to date […]

Beware: Hackers Exploit Loopholes in Public Wi-Fi

Public Wi-Fi is all well and good, but its very nature makes it easy to exploit and allow hackers access into your system – unless you have the proper security protocols in place. These days, Wi-Fi is everywhere. Airports, coffee shops, train and bus stations, malls – almost every public place you can think offers Wi-Fi connectivity. Being connected to the internet has evolved from luxury to necessity, and whether it’s for personal or business reasons people are online as much as possible. This is all well and good, except when you consider that hackers have started to extend their playing field to public Wi-Fi networks. With the volume of sensitive information such as passwords and financial transactions, it’s inevitable that crooks and fraudsters move to public networks where there is more potential to illegally farm large chunks of information. Two things are important about this emerging trend. First, it’s the very nature of public networks that makes them vulnerable to attack. Second, hacking has become much easier these days, with very simple hacking programs such as Firesheep easily downloadable from the web. However, the solution is simple as well: have the proper security protocols on your smartphone or laptop. It’s unfortunate that many people neglect to recognize the importance of such policies, and only have minimal security (if any at all) to guard against attacks. But as long as you have the proper protocols in place, you can stay connected – even through public Wi-Fi – without fear of hacking or any sort of intrusion into your system. If you want to know more about keeping your portable devices safe from attacks, please feel free to contact us. We’ll be glad to explain the issue in more detail and draw up a solution customized to fit your needs.

Lessons from the Epsilon Incident

One of the world’s leading email service providers, Epsilon, found itself the victim of a phishing attack that saw a significant amount of data lost to cyber-thieves. It’s important to learn from mistakes like these and make sure that both your own and you clients’ data is kept secure and safe from thieves. There’s been a lot of buzz recently about Epsilon, one of the biggest email service providers in the world, as it suffers from the backlash of allowing itself to be a victim of phishing efforts – which has affected the business data of as many as 50 major companies who are clients of theirs. Reports are also citing Epsilon’s failure to heed an alert from a business partner which advised the provider to be on its toes against potential attacks from cyber-criminals targeted towards email service providers. The damage estimates vary, with Epsilon citing only about 2% of their data being stolen, but the impact is undeniable. Cyber-criminals now have access to a sizable number of personal data stored through Epsilon – passwords, account numbers, and even the purchasing / buying habits of the customers of Epsilonงs clients. Many of Epsilon’s clients are now sending out messages to their own customers, warning them that their email addresses may have been compromised. It’s a lesson to companies, big and small, to pay more attention to beefing up their security protocols, since all it takes is one breach to endanger all of your data. In addition to having the right security software, it also helps if you require your employees undergo proper user training to make sure that they won’t be easily baited by scams like phishing, and will be more aware of how to contribute to the safety of your business data. Failing to do so puts not only your company, but also your clients, at risk. If you’d like to make sure your systems are safe, call us and we’ll evaluate your current security measures and suggest ways to make critical improvements.

How to Protect Your Data When Employees Leave

The growth of technology in the business environment has been a boon, but it also gives departing employees many methods of taking data with them. In the past, they used CDs; today, they can copy files to a portable USB storage device, email them, or even use a smartphone. Here’s how you can protect yourself. Remember the days when employees kept important information in paper files? They are long gone. According to a study conducted by the University of California at Berkeley, almost all of today’s new information is stored electronically. And that could mean trouble for your company when an employee resigns — because electronic documents are both easy to copy, and portable. That makes them more prone to theft than paper documents. Case in point: In August 2009, DuPont filed a lawsuit against a research scientist who allegedly stole more than 600 files by copying them to a portable hard drive. And that wasn’t an isolated incident; another DuPont research scientist was sentenced to an 18 month prison term for stealing proprietary information worth $400 million. Think employee data theft doesn’t apply to your type of business? Think again. A 2009 study conducted by the Ponemon Institute found that data theft is rampant in the business world. According to the study, 59 percent of employees who quit or are fired take confidential business information with them. And when the employee works in IT, the access to confidential data is even greater. A 2008 study by Cyber-Ark Software found that almost 90 percent of IT employees would take sensitive company data with them if they were laid off. The lesson: When employees leave, you must take steps to protect the electronic information they have access to. This may include customer information, financial records, trade secrets, intellectual property, and email lists, to name just a few items. We recommend that when an employee leaves, you prevent his or her account access, set the account for immediate review, save any necessary files (which may involve consulting with other departments for verification of documents), then delete the account. In addition to protecting data, this will also optimize server space and open up more storage space for the company. While some employees might argue that they need access to their personal files before departing, and you may grant such access (supervised, on a case-by-case basis), it is not required; any of the information that is located on a company computer is company property. In a sensitive situation it’s always good to let us know ahead of time so we can help you prepare for a well-managed and secure transition.

Set up a productive, efficient, and secure remote team that can help you run your business anywhere. Download our free eBook today to learn how!Download here
+