How to Educate Your Employees About Cybersecurity

By Roger Murray | May 2nd, 2017| Network Security

Network Infiltration and Data Breaches are normally blamed on the malicious outsider.  However, the responsibility for most organizations network security is with their employees, who unwittingly open the door welcoming cybercriminals into your environment. That’s why it’s crucial to properly educate your employees about Cybersecurity.  When you provide routine training as a preventative, not reactive, … Continued

Can Your Business Survive a Ransomware Attack?

By Roger Murray | February 14th, 2017| Network Security

When your business is hit by crypto-malware, you become keenly aware of just how little preparation and planning you have done to prevent your data from being compromised. SonicWALL reported Ransomware Attacks on businesses of all sizes reached $638 million in 2016, a considerable uptick from the $3.8 million reported in 2015. The exponential growth … Continued

Network Security: The 5 Things Every Small Business Should Know

By Roger Murray | January 3rd, 2017| Network Security

Nearly every business believes the unfortunate data breaches and attacks only happen to others; that the overall risk of an attack on your business is low.  Why would anyone care to target me? The truth is that hackers would love nothing more than to gain access to your sensitive company data.  It’s why we decided … Continued

Keeping Your Information Secure This Holiday Season

By Roger Murray | November 23rd, 2016| Network Security

There is a certain amount of accepted risk associated with shopping, especially during the holiday season.  Identify theft and fraud have become an accepted risk for many online and retail shoppers.  This year is thought to see an even greater level of attacks aimed toward the consumer market, ranging from malicious sites exploiting your data … Continued

Identifying Tech Support Fraud

By Roger Murray | November 7th, 2016| Network Security

We’ve all received unsolicited calls before, most offering complimentary services or attempting to sell a product.  However, a growing trend in gaining access to an otherwise secure network involves deceiving a caller into divulging pertinent information, or worse, control of their computer to install malware. How It Works:  This alternate approach with initiating a hack by … Continued

Lessons from the Recent DDoS Attack

By Roger Murray | November 2nd, 2016| Network Security

Last month, huge parts of our internet essentially shut down; from Amazon, Twitter, and Spotify, to Netflix and Reddit.  One of the biggest takeaways from the attack is the realization of just how susceptible our fragile internet truly is.  The graph below shows just how quickly and to what extent the United States’ internet was … Continued

Understanding Security Assessments

By Roger Murray | October 26th, 2016| Network Security

It may come as of little surprise that security breaches hurt small business much more than larger corporations. According to the National Cyber Security Alliance, more than 70% of attacks target small businesses.  It is also estimated that 60% of hacked small businesses experience devastating economic hardship, leading many to suffer a complete loss, closing … Continued

Understanding Information Technology Assessments

By Gerard Louise | October 24th, 2016| Network Security

The term Information Technology (IT) Assessment is often convoluted because it is so often portrayed as the simple and easy process of scanning an organization’s existing network.  However, this could not be further from the truth.  It is important to remember that a formal Technology Assessment is not a Technology Audit.   The use of terminology … Continued

Lost & Found: The Dangers of Mystery USB Drives

By Kenneth Sprague | October 3rd, 2016| Network Security

So if you found a USB Stick in the parking lot this morning, what would you do?  What if you found one in the course of your job, in a rental car, or in a “Lost & Found” box in your office?  You would be curious to see what is on the drive or inclined … Continued

Study Reveals More Than 50% of SMBs Have Experienced a Data Breach in Past Year

By Roger Murray | August 8th, 2016| Network Security

A new study on the topic of Cyber-security and the proliferation of cyber-attacks against Small and Medium-Sized Businesses (SMB) was released this month. Historically, criminals would focus attacks on larger enterprise level organizations in an effort to reap a much larger reward. However, the level of technical expertise needed to infiltrate these companies’ security required … Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979