employees-compromise-security

Ways Your Employees Compromise Data Security

Last week’s blog included tips on how to be proactive in your network security. One of those ways was to train your personnel. This week we will discuss why it is so important to have a trained staff. Here are five ways employees can compromise your data security. Inside Job Thinking this is an inside job is the worst one to bring up, but we will just go ahead and get it right out of the way. Yes, sometimes your employees can be so mad about something that they will …

network security

Proactive Network Security

Why wait around for your network to become compromised? There are some simple methods you can start putting in place now to be proactive in this hacker day-of-age. 1. Get Support The buy in and measurements required to support a network-wide security measure is imperative. You need to get your manager’s/boss’s full support, so they understand the scale of what you want to do and the threat that is making you want to take those measures. The best way to garner support from those key executives is to show them …

printer security header

Printer Security…Is that a Thing??

Printers. Every office has one, but do you think any more about it unless it isn’t currently working? Should you? The answer is yes. Printers can be one of the biggest risks to your network security. Per HP, “There are hundreds of millions of business printers in the world and less than 2% of them are secure”, which is a great thing for anyone wanting to wreak havoc in your organization. Listed below are some of the main threats and vulnerabilities found in printers and some ways to mitigate them. …

cyber security lock

Humans: The Last Line of Defense in Cybersecurity

In this day in age, where we all hear about is malware, ransomware, and other virus attacks businesses and individual’s get nailed with on a daily basis, human error is still the number one way hackers get into your systems. That isn’t to say that anti-virus programs and system backups aren’t important, they are still critical. After the systems in place to keep your data secure, humans are the last line of defense in this battle. That questionable email attachment, the pop up on the screen that says your computer …

ransomware image

Your Data is More Valuable Than You Think

Big company or small business, your data is valuable to not only you but hackers too. Don’t ever think that your firm is “too small” to be the victim of an attack. According to a recent NY times article, sixty percent of all online attacks in 2014 targeted small and midsize businesses. That number has only been growing over the past few years. With the increase in popularity of ransomware and phishing scams, individuals and businesses at every level are more prone to be targeted. It is easy money for …

managed services header

Non-Profits IT Solutions

For those of you in the non-profit world, you know that ever dollar matters. It means you run lean for marketing and staff and even leaner for technology. Everyone pitches in and helps out where their skill set allows. This usually leaves most organizations without proper IT items: no dedicated IT staff, no fancy new computers and no time to keep current systems going.

data security image

Ransomware – The New Business Security Threat

Let’s be honest. We all know someone at work (*cough* ourselves *cough*) who doesn’t always practice what the IT person preaches when it comes to security. All of those methods your IT person harps about are especially important to start adhering to with the new Ransomware schemes that are out there.