IT Security Tips for Small Business
Because IT and cybersecurity are such an IMPORTANT issue, we are promoting a series of IT security articles with useful tips to show you and your employees how to significantly improve your protection from being a victim of cybercrime. Every business must make certain their employees are clear on how to appropriately use, handle and protect company data and devices.
Every time we focus on one simple, specific action you can take to avoid a potential data breach.
Browse the blog posts below for useful tips and information.
IT and Cybersecurity Tips Blog Archive
Today, one of the largest data breach data sets was released containing roughly 773 million unique records of email addresses and passwords. Microsoft Regional Director and MVP Troy Hunt obtained the original data set, titled ‘Collection #1’ from a hacker forum. The...read more
Cyberattack cleanups now come with a sticker shock: increase of 52% now brings the estimated amount to $1.1 million, with potential to increase even further, to a staggering $1.67 million, according to a recent Radware’s 2018-2019 Global Application and Network...read more
A new phishing attack is using fake non-delivery notification in an attempt to steal users’ Microsoft Office 365 credentials. These credentials will then be used to send messages from the users account, further spreading malicious emails and software. In this case,...read more
Each year, SplashData., Inc, a leader in password management, analyses leaked passwords to find the top commonly used passwords. In 2018, SplashData, Inc. had five million passwords to work from, most of them from hacks in the US and Europe. According to the...read more
The United Staes Computer Emergency Readiness Team (US-CERT) of the Department of Homeland Security (DHS) have issued a new alert for a ransomware known as SamSam (MSIL/Samas.A.) - just days after two mastermind suspects were charged by US Department of Justice. The...read more
The Internet of Things (IoT) devices are outnumbering the population of our planet. It is projected that the planet will have 20.5 billion devices just two short years away, in 2020. In the next five years the cybercrime is expected to result in business-related...read more
If not familiar, Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. A computer can become infected with Ransomware in a number of ways; thorough an email, an infected link, or even an infected ad on a...read more
While ransomware attacks have slowed down with cybercriminals shifting their focus to cryptojacking (mining virtual currencies), cyberextortion is still widespread. Here are a few examples of recent cyber extortion attacks: Systems of Onslow Water and Seer Authority...read more
Mass hijackings of network traffic and it's abuse is not new, but with the evolution of technology, so do Man-in-the-Middle type of attacks. A man-in-the-middle attack is an exploit that occurs when an outside attacker intercepts communications between two parties,...read more
On October 3, 2018, the U.S. Department of Homeland Security (DHS) issued a major warning to IT service providers, IT managed services providers (MSPs), and cloud services providers (CSPs) and their customers. The warning came from the National Cybersecurity and...read more
As a small/medium business owner, patch management may be a somewhat foreign topic reserved for your IT personnel. The following provides a summary-level background of patching, which is relevant to business owners in maintaining appropriate security disciplines in...read more
A while ago Google made changes to its Chrome browser, forcing a sign-in to the Chrome itself, by default, once a user engaged with any Google service, such as Youtube or Gmail. As a result, it was possible that users may have assumed that once they'd signed out of...read more