Network Security Best Practices: Could the Real Threat to Your Business’ Network Come From the Inside?

Today, the number of types of cyber-attacks which threaten the security of your businesses are endless.  We’ve discussed the greatest weakness in network security being users before, but the focus was in a non-acting participant being coerced into clicking on a malicious link or opening a dangerous attachment. We often focus so much attention to…

Read More

Everything You Need to Know About Network Vulnerability Assessments

It may come as of little surprise that security breaches hurt small business much more than larger corporations. According to the National Cybersecurity Alliance, more than 70% of attacks target small businesses.  It is also estimated that 60% of hacked small businesses experience devastating economic hardship, leading many to suffer a complete loss, closing their…

Read More

How to Counteract VoIP Vulnerabilities: VoIP Security Risks

In today’s day and age we have become familiar and hopefully cautious when receiving strange emails with a random file attached. It’s unlikely that we would give it a second thought before deleting. This is because we recognize the need for cyber security to limit the onslaught of digital threats we receive on a seemingly…

Read More

How to Become PCI Compliant: An Informal PCI Compliance Checklist

If your business processes credit cards or other forms of electronic payment, it is required to meet the standards established by the Payment Card Industry (PCI).  That means not only retailers, but any establishment that accepts card payments in their place of business.  If you don’t maintain PCI standards for compliance and suffer a data…

Read More