“Once upon a time, there was a Good Fairy called Anti-virus that would protect your computer from all evildoers…” Yes, the above is a fairy tale. I’m sorry to have to break it to you, Dorothy, but you aren’t in Kansas anymore. Having an antivirus installed on your system is a good start. But a […]
8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
8 Steps to Better Security: A Simple Cyber Resilience Guide for Business is a great resource for executive management whether technical or not, this book provides easy-to-understand best practices for the strategies that companies should take to secure their IT networks. While many leaders understand the importance of investing in cyber security, limited budgets and […]
TIP: How to Detecting and Handle Phishing Email Campaigns
Suppose you receive an email that seems to be from someone you know, especially someone in a leadership position for an organization to which you belong, instructing you to spend your own money on something. In that case, it’s probably a phishing email. What to Look For in a Phishing Email: What to Do: At […]
Phishing: Anatomy of a Dedicated Campaign
Everyone hears about the concept of a phishing attack. The quintessential “Nigerian Prince” or the link to check on a charge to your card trying to elicit your account login information. I receive at least one, if not more, text message every day wanting me to click on a link to check on my Amazon […]
Weak Cyber Security Can Damage Your Business in Many Ways
You probably understand the immediate damage that inadequate cyber security can do to your organization, but few think about the long-term consequences. Ransomware attacks can cause data loss, ransom payments, halted operations, and increased costs to fix and make your systems secure (which you should have done before you were hit). Misconfigured systems may be […]
Basic Cyber Hygiene is Critical to Remaining Cyber Safe!
What is Cyber Hygiene? Cyber Hygiene isn’t what you were taught in health class about keeping your private parts clean. There are similarities. If you follow some basic rules to protect yourself, you can protect yourself from embarrassing problems down the road. Passwords Don’t use passwords. Instead, use PassPhrases. Instead of trying to come up […]