Can You Spot a Scam When You See One?

Can You Spot a Scam When You See One? – Learn How to Recognize Suspicious Texts and Emails!

As we are all getting used to the new normal, people continuing to work from home or staff returning to work, there continues to be a lot of change and unrest. Users are frustrated, concerned, overwhelmed, hurried and uncomfortable. As such they may forget to follow due diligence recommendations. Additionally, our hackers just keep getting more creative and continue to hunt for opportunities.

Keeping your business and information safe is critically important to us. Whether these attacks are directed at the business or the home, your users are exposed. Therefore, we continue to identify new threats and help you stay in front of the latest business scams and hacking attempts.

Read more

6 Important OS Hardening Steps to Protect Your Data and End Users

Are your systems protected? Is your IT Team overwhelmed or your current IT Partner leaving your business vulnerable? According to the Duo Trusted Access Report, only 53% of Mac OS users are running either the fully patched, latest version of OS X, or the previous version, compared to 35% of Windows users on Windows 10 and 8.1. That means most of these operating systems are outdated, unpatched or unsecured – leaving your business vulnerable to compromises and extended downtime.

While proper patch management is critical to protecting business data and employee up-time, it is only one of many security considerations. Ransomware-as-a-Service continues to grow, it?s just as important, we are seeing a rise in popularity of Operating System (OS) Exploit Kits.
Read more

Returning to the Office: A Checklist for Your Businesses

As many counties ease lockdown restrictions, businesses around the Bay Area will slowly begin to reopen their doors. As some look forward to getting back into the office, other will continue to feel wary. One thing is for certain ? the workplace is going to look very different for many of us.

How can you best prepare your team for the ?new normal?? What should you take into consideration to ensure a successful return to the workplace, especially when it comes to employees, office space, and technology? While it is not an exhaustive list, our Returning to the Office: A Checklist for Your Businesses covers the items to consider as your office begins to reopen. Read more

Generating Your Security Mindset During These Times

Here we are, months later, still dealing with the changes this pandemic has created. Most changes haven’t been fun, but it’s made for very interesting times. Many businesses are focused on balancing between more or (for some) less work, figuring out how to maintain staff, motivate existing staff remotely, determining how to keep staff busy and preparing for what tomorrow will bring as we slowly start to come out of the COVID-19 quarantine. Now, more than ever, is the time to re-evaluate your businesses Security Posture and implement solutions you may have been hesitant to consider previously. It’s predicted that by 2021, cyber crime will cost the world $6 trillion annually. Even more frightening is the fact that on average, there is a hacker attack every 39 seconds Read more

Insider Threats, What?s the True Cost to Your Organization

Insider threats cost companies millions. According to the Ponemon Institute?s recently released study ?2020 Cost of Internal Threats.?? In the last two years we have seen a 31% increase in threats emerging from inside an organization. Costs range from $756K to $871K per incident, depending on the type of breach.

There are three types of Insider Threats:
  • Careless, Negligent Employee or Contractor– These are well-intentioned employees or other users who accidentally harm the enterprise. These incidents happen all the time, but? a lot of people don?t think about this threat. Employees constantly make mistakes that put company data at risk — whether that?s because they?re careless, taking shortcuts, or simply uneducated in security. These mistakes add to the challenges faced by IT Teams daily. Ransomware, for example, is often put on a computer because of an employee?s careless browsing or download habits. Phishing attacks are another great example.

Read more