Hilton Data Breach Results in $700,000 Penalty

By Roger Murray | November 13th, 2017 | Governance & IT Compliance

Hilton Hotels reached a settlement this month with New York Attorney General Eric T. Schneiderman and Vermont Attorney General TJ Donovan following two breaches in 2015. The settlement totaled $700,000

Google Partners with ESET to Provide Malware Detection for Chrome

By Scott Evans | November 2nd, 2017 | Network Security

Chrome Cleanup uses ESET technology to identify and eradicate suspicious or unwanted software on your Windows computer.  The tool operates in the background, with no slowdowns or interruptions to the user with three easy steps.

Four Ways Ransomware Can Destroy Your Backups

By Chris Souza | September 14th, 2017 | Network Security

I just found a very interesting blog post by Jerome Wendt, President & Lead Analyst of DCIG, Inc., an independent storage analyst and consulting firm. He started out with “The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing … Continued

The Current State of Ransomware Among SMBs

By Roger Murray | August 1st, 2017 | Network Security

In a report conducted by Osterman Research and sponsored by Malwarebytes, more than 1,000 small and medium-sized businesses were surveyed in June 2017 about ransomware and other critical security issues. What we discovered was surprising—ransomware authors aren’t only targeting enterprise businesses for big payouts. They’ve got their greedy gaze on businesses of all sizes. In … Continued

Data Breaches Up 29 Percent Over Last Year

By Roger Murray | July 26th, 2017 | Network Security

Data breaches are running 29% above last year, according to a report released by the Identity Theft Resource Center and Cyberscout.  Hacking was the leading cause of data breaches nationwide, more than 790 so far this year. More than 12 million records have been exposed, although two-thirds of data breach notifications or public notices did … Continued

How to Educate Your Employees About Cybersecurity

By Roger Murray | May 2nd, 2017 | Network Security

Network Infiltration and Data Breaches are normally blamed on the malicious outsider.  However, the responsibility for most organizations network security is with their employees, who unwittingly open the door welcoming cybercriminals into your environment. That’s why it’s crucial to properly educate your employees about Cybersecurity.  When you provide routine training as a preventative, not reactive, … Continued

Can Your Business Survive a Ransomware Attack?

By Roger Murray | February 14th, 2017 | Network Security

When your business is hit by crypto-malware, you become keenly aware of just how little preparation and planning you have done to prevent your data from being compromised. SonicWALL reported Ransomware Attacks on businesses of all sizes reached $638 million in 2016, a considerable uptick from the $3.8 million reported in 2015. The exponential growth … Continued

Network Security: The 5 Things Every Small Business Should Know

By Roger Murray | January 3rd, 2017 | Network Security

Nearly every business believes the unfortunate data breaches and attacks only happen to others; that the overall risk of an attack on your business is low.  Why would anyone care to target me? The truth is that hackers would love nothing more than to gain access to your sensitive company data.  It’s why we decided … Continued

Keeping Your Information Secure This Holiday Season

By Roger Murray | November 23rd, 2016 | Network Security

There is a certain amount of accepted risk associated with shopping, especially during the holiday season.  Identify theft and fraud have become an accepted risk for many online and retail shoppers.  This year is thought to see an even greater level of attacks aimed toward the consumer market, ranging from malicious sites exploiting your data … Continued

Identifying Tech Support Fraud

By Roger Murray | November 7th, 2016 | Network Security

We’ve all received unsolicited calls before, most offering complimentary services or attempting to sell a product.  However, a growing trend in gaining access to an otherwise secure network involves deceiving a caller into divulging pertinent information, or worse, control of their computer to install malware. How It Works:  This alternate approach with initiating a hack by … Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979