Are Your Business Network Credentials for Sale on the Dark Web?

Posted by Stephanie Hurd on Oct 6, 2019 9:08:11 AM

You use password-protected applications for everything from banking and financial management to planning vacations and socializing. In the workplace, sign-in credentials connect you and your employees to business applications and online services like payroll processing, appointment scheduling, invoicing, and every other confidential function of your business.

Read More

Topics: Cybersecurity, Threat Prevention

Employee Behavior is the Key to HIPAA Compliance & Data Security

Posted by Stephanie Hurd on Aug 12, 2019 8:27:36 AM

On June 6, 2019, Presbyterian Health Services, a health care system and health care provider in New Mexico, discovered a potential breach of protected health information (ePHI).

You might assume that a hacker breached their firewall or snuck into their network undetected. That was not the case. The breach occurred because well-intentioned employees fell victim to a phishing email.

Read More

Topics: HIPAA, Business Strategy, Cybersecurity, Threat Prevention

Protecting Your Business from a Ransomware Attack

Posted by Stephanie Hurd on May 22, 2019 1:28:27 PM

National headlines about ransomware attacks crippling Baltimore City and Cleveland Hopkins International Airport might leave smaller businesses thinking that governments and large corporations are the only entities facing a real threat of attack.

However, threats against businesses of all sizes have been on the rise. Malwarebytes Labs issued a Cyber Crime Tactics and Techniques 2019 Q1 Report stating that cyberattacks on businesses in general have increased 235% in the past year. Ransomware specifically is gaining rapid momentum in Q1 2019 with a 195% increase in ransomware attacks on businesses from Q4 2018 to Q1 2019.

Read More

Topics: Cybersecurity, Threat Prevention, Disaster Recovery

Promoting Email Safety in Your Business

Posted by Aaron Sipes on Feb 27, 2019 8:44:09 AM

It happens quite often – someone points out to you that they’ve received a strange email from this person or that person, or maybe even you.  Of course, you don’t remember sending that email and why would you include the need to pay an invoice in it for a co-worker?

Spam and spoofed emails are a common way hackers and malicious programs penetrate business networks, and are nearly impossible to prevent on a global basis for a given network. However, there are precautions that significantly decrease the volume of malicious emails and educate users on how to handle those that make their way into their inboxes.

Read More

Topics: Cybersecurity, Threat Prevention

Business Cyber Threat Prevention

Posted by Alex Samuel on Feb 21, 2019 3:12:58 PM

Cyber threats are a major risk to every business of every size. Risks associated with viruses, ransomware, and identity theft can cost you lost revenue, loss of reputation, and in many cases even put you out of business.

In today’s world, it’s not a matter of IF a business will experience a cyber threat but WHEN, so all businesses must be prepared.

Specific security requirements vary based on the size and scope of your business, nature of your work, and security compliance regulations. However, a good, multi-layered security approach for all businesses starts with threat prevention, but most important to protecting your business, is built on the foundation of a solid disaster recovery system.

This approach should include the following components.

Read More

Topics: Cybersecurity, Threat Prevention, Disaster Recovery

IT Starts with Strategy

Tips to get the most out of business technology

Expert advice and best practices allowing you to leverage technology for business growth. 

Topics include:

  • Fusing business and technology strategy
  • Business operations
  • Budgeting and lifecycle management
  • Network security and compliance
  • Data security and backup
  • Hardware and infrastructure 
  • Phone systems
  • Printers and copiers

Subscribe Here!

Recent Posts