Cyber Security
Fraud Detection: Identifying Tech Support Scams
We’ve all received unsolicited calls before, most offering complimentary services or attempting to sell a product. However, a growing trend in gaining access to an otherwise secure network involves deceiving a caller into divulging pertinent information, or worse, control of their computer to install malware. How It Works: This alternate approach with initiating a hack by speaking on the phone revolves around our heightened sense of awareness and skepticism for opening…
ContinuedDDOS Mitigation Strategies: Lessons From a Recent DDOS Attack
Last month, huge parts of our internet essentially shut down; from Amazon, Twitter, and Spotify, to Netflix and Reddit. One of the biggest takeaways from the attack is the realization of just how susceptible our fragile internet truly is. The graph below shows just how quickly and to what extent the United States’ internet was wiped out. Understanding how the attack occurred, the root cause, and the best ways to…
ContinuedEverything You Need to Know About Network Vulnerability Assessments
It may come as of little surprise that security breaches hurt small business much more than larger corporations. According to the National Cybersecurity Alliance, more than 70% of attacks target small businesses. It is also estimated that 60% of hacked small businesses experience devastating economic hardship, leading many to suffer a complete loss, closing their doors within six months following a breach. While discounting the need for security may save…
ContinuedWhat is The Difference Between an Information Technology Audit and a Technology Assessment?
The term Information Technology (IT) Assessment is often convoluted because it is so often portrayed as the simple and easy process of scanning an organization’s existing network. However, this could not be further from the truth. It is important to remember that a formal Technology Assessment is not a Technology Audit. The use of terminology is not just about semantics, but rather expectations. An audit is a required procedure conducted…
ContinuedNetwork Security Best Practices: What To Do With A Mysterious Thumbdrive
So if you found a USB Stick in the parking lot this morning, what would you do? What if you found one in the course of your job, in a rental car, or in a “Lost & Found” box in your office? You would be curious to see what is on the drive or inclined to try and locate who it belongs to. What would you consider the chances are…
ContinuedWhat To Do After a Ransomware Attack
The topic of Ransomware is a steadily increasing mainstream topic affecting both small and large businesses alike. We’ve discussed some of these common types of intrusions before, this type of malware encrypts your data and holds it for ransom to receive the key, it requires a fast acting user in order to minimize the amount of damage it can cause to your machine or business infrastructure. The aftermath of a…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place