Protected: Protecting Your Company from Ransomware Attacks
There is no excerpt because this is a protected post.
Protected: Protecting Your Company from Ransomware Attacks Read More »
There is no excerpt because this is a protected post.
Protected: Protecting Your Company from Ransomware Attacks Read More »
Require Password Rules and Enforce Them Strong passwords are one of the first lines of defense against breaches and changing them occasionally may help keep hackers out. But most staff will not voluntarily update their passwords, even when prompted. Make regular password updates mandatory and teach users how to create and remember strong passwords. Update
Ransomware is a cyber threat that is only increasing in prevalence. Ransomware is an attack on data that will restrict the ability for a business to access that data. The attacker will hold your data for a “ransom”, often payable with Bitcoin. However, paying the attacker should be a last resort. Contacting the FBI should
Tips for Ransomware Prevention Read More »
Does your company monitor and control mobile access to shared systems like MS Sharepoint, Teams, and other types of cloud sharing platforms? Are you controlling the ability to share your information externally from these portals? MS Sharepoint, Teams and other types of cloud sharing platforms have mobile access capabilities. These portals can be controlled through
Mobile Device Access to Company Information through Sharepoint Read More »
How many times have you downloaded an app, and during the install process, it asks you for access to contacts, calendars, and other hardware like your camera? Did you stop and ask yourself, why does an app need access to my camera and do I need to give it the permissions? For some apps, it
Protecting Your Mobile Devices from Threats: Application Permissions Read More »
In today’s IT System Administration Environment, where a user or IT professional is given an administrative account to manage services, application installs, and server management, a single source of access across all these functions can lead to disastrous results in the event of a breach. If there is only one admin account that manages your
Cyber Tip: Administrative Accounts and Password Security Read More »
What you know, what you have, and who you are; These are three types of authentication. What you know, your password. What you have, a mobile device with a code through an authenticator app. And who you are, biometrics. So why use it and how do I do so? Access to shared file storage platforms
TWO FACTOR/MULTI FACTOR AUTHENTICATION AGAINST DISCLOSURE Read More »
Over the past 2 years, since the Covid-19 pandemic began, almost 50% of companies have not changed their information security landscape despite the change in networks from brick and mortar to hybrid and remote(ref). Despite the lack of change in environments, we are also still getting hit by attackers through more simple and avoidable means.
Cyber Threats in Our Government and Market Environment Today Read More »
In our Blog Email Instincts: Phishing Ploys, we mentioned links that are malicious by redirecting you to a different website than the one you believed you were visiting, like the office.com website. The real ploy is to get you lured into the belief that you need to change or update your password through an email
Email Instincts: Phishing Links that Redirect You to a Fake Website Read More »
Do you access cloud-based company data from your home network through a home-grade modem/router/gateway device? What is protecting your data as you upload and download documents and applications from the internet? If you don’t have a VPN installed on your computer…you have no encryption of data for internet communications and thus, nothing is protecting the
Using a VPN to Protect Browser Traffic at Home or While Working Remote Read More »