Cybersecurity

Dark Web – um, what’s that?

So I’m guessing by now you’ve at least heard the term “The Dark Web.”  Ooh, it sounds so nefarious, right?  Just by uttering the name, you might end up on a government watch list or something.  Well, just because it’s somewhat shrouded in mystery, doesn’t mean you shouldn’t be aware of what it’s all about. …

Pushing Send? That Email Isn’t Secure

Every day, we send an estimated 306 billion personal and professional emails around the world. Still, it’s not secure. Any sensitive documents, proprietary information, or private data sent are at risk. Sending an email is fast and quick, but when it comes to sensitive information, you’re better off using a different method of delivery, one…

Let’s Talk About The Colonial Pipeline Hack

In this blog post, I go through a bit of a post-mortem about the Colonial Pipeline Hack and some of the details that have been released since the hack went public. Quickly, if you’re not up to speed on exactly what went down there, one of the largest pipelines providing gasoline to the East Coast…

What to Do If You’re a Ransomware Victim

If you’re a victim of ransomware, you’ll know it. Often you’re met with a red screen telling you your business files are encrypted. You won’t be able to do anything on the computer, although the cybercriminals will provide helpful instructions for how to pay up. How nice. Cybersecurity Ventures predicts ransomware will impact businesses every…

What Is Shadow IT, and Why Is It an Issue?

An old-time radio show used to start with the promise “The Shadow knows!” Yet when it comes to shadow IT, the problem is the exact opposite. Shadow IT is the stuff employees download onto a business system that IT doesn’t know about, and it can be a big problem. You may have an IT policy…

How to Protect Your Proprietary Information

Proprietary information makes your business special, whether you’re a tech startup with a smart algorithm or a food manufacturer with a secret sauce. Regardless of industry, businesses gain competitive advantage from distinct practices or unique data. The last thing you want is someone with ill intent getting their hands on your differentiation. We all know…

Don’t Get Hooked by Spear Phishing Attacks

Phishing attacks have been around for a long time. They are designed to steal your credentials or trick you into installing malicious software. Unfortunately, they have persisted in the IT world because they’re both devastatingly simple and effective. Spear phishing is a more modern and more effective version of this traditional attack. A typical phishing attack…

Island Hopping: Not Always a Good Thing

When you hear the phrase “island hopping,” you may think of cruising beautiful sandy beaches on a tour of tropical islands. Unfortunately, cybercriminals have given the term a new, less pleasant spin. Island hopping is an increasingly popular method of attacking businesses. In this approach, cybercriminals target a business indirectly. In order to reach their…

Common Compliance Issues You Might Be Missing

Information security is on every business’s radar these days. Data drives so much of what we do. Looking to contain the risks, many sectors have established IT compliance regulations. Whether meeting a standard or not, don’t overlook these common areas of concern. Governments and regulatory agencies have established compliance standards for the financial, legal, healthcare,…

What Hackers Target In Small Business

Hackers today have many ways to attack small businesses and business owners. Many attempt to use technology to send malware, viruses, or phishing attacks; or use information to con owners and employees into handing over more information than they should. One or more of these techniques can be combined with gaining physical access to steal…