With the holiday shopping season just around the corner, here are some reminders of how to stay safe while shopping online. Before you start shopping, update your software (including your phone). These updates will improve your security. By the way, you should always be doing this on a regular basis (preferably automated). Not just during […]
What do you mean I was hacked? I Have Anti-Virus!
“Once upon a time, there was a Good Fairy called Antivirus that would protect your computer from all evildoers…” Yes, the above is a fairy tale. Sorry to have to break it to you Dorothy, but you aren’t in Kansas anymore. Having an antivirus installed on your system is a good start. But a good […]
8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
A great resource for executive management whether technical or not, this book provides easy-to-understand best practices for the strategies that companies should take to secure their IT networks. While many leaders understand the importance of investing in cyber security, limited budgets and increased risk mean that security dollars must be spent wisely in order to […]
TIP: Detecting and Handling Phishing Email Campaigns
If you receive an email that seems to be from someone you know, especially someone in a leadership position for an organization to which you belong, instructing you to spend your own money on something, here are tips on what to look for and what to do. What to Look For: Is the email address […]
Anatomy of a Dedicated Phishing Campaign
We hear about the concept of a phishing attack. The quintessential “Nigerian Prince” or the link to check on a charge to your card trying to elicit your account login information. I receive at least one, if not more, text message every day wanting me to click on a link to check on my Amazon […]
Weak Cyber Security Can Damage Your Business in Many Ways
Business owners understand the basic damage that inadequate cyber security can cause, but few think about all of the long-term consequences. Ransomware attacks can cause loss of data, ransom payments, halted operations, and cost to fix your systems and make them secure (which you should have done before you were hit). Misconfigured systems may be […]