Back To Basics

A lot of time is spent on staying protected from the newest type of scam or the newest cybercrimes, but as is true with many things, remembering the basics is the entire foundation of making sure you, your company and your clients remain safe.

Everyone in the company or organization should know basic security principles.

Why Do I Need So Many Passwords?!?

Passwords and management of those passwords are a big pain – no two ways around it. One website requires a symbol, another requires 14 characters and your bank requires 10 characters, four PIN numbers and the answer to a secret question. It becomes easy to just use the same three or four passwords for everything – after all, that’s more secure than one password for everything, right?!

Here’s the problem with this strategy.

The Onscreen Keyboard – Use It!

One of the most notorious spyware/malware targets is your keyboard – keylogger software has been around for ages. The longtime favorite of electronic crooks, keyloggers are made even easier for bad guys to distribute and for you to accidently come in contact with by modern security breaches.

Internet of Things – Are You OK Playing Offense?

Technology has made our lives better. After all, adjusting the thermostat and turning the hot-water heater back to normal temperature as you board the plane to come back home from vacation isn’t only cool, it’s very handy. However, all of the connected devices in the world today – or the Internet of Things (IoT) – is also one of the biggest security problems seen in a very long time.

Are You Backing Up Your WEBSITE?

While most businesses understand the importance of backing up their server and files, many forget to backup their website!

Most sites are hosted on a third-party platform like HostGater or WordPress. However, these hosts have limits on what they backup, and the Terms and Conditions you agreed to most likely waive their responsibility to preserve and backup your files and data.

Do You Need An “Incident Response” Plan?

An incident response plan is an organized approach to addressing the aftermath of a security breach or cyber-attack. Certain industries, like medical or financial institutions, absolutely should have one.

But even if you don’t have a lot of sensitive information, it’s best to have SOME idea of what you would do if a cyber-attack locked all your files or stole confidential information.

Why You Might Want To Cover Up Your Webcam With A Sticker

Here’s a disturbing, but very real, tactic for hackers: spying on you via your device’s camera. Some simply watch you for fun. Others attempt to catch incriminating photos and then blackmail you by threatening to release the photos or video (which they have) to all your Facebook friends, LinkedIn connections, or email address book (which they also have) unless you pay a ransom.

Should You Allow Guests Access To Your WiFi Network?

Do you have guest access on your company WiFi network? Or do you simply give out the same password that your employees use? If you give out your password, you’re practically opening the door for anyone to come in and steal private information, infect your private computers, and even steal customer credit card data if you are processing them over the same Internet connection.

“Is My PCI Compliance Good Enough To Serve As A Network Cyber Security Audit?”

We often get asked if an organization has passed its PCI compliance requirements for accepting credit cards; is there really a need for more security and compliance? The answer is yes!

While the PCI architecture and requirements heavily overlap network security issues, a network security audit is going to take a deeper look into how you utilize the technology you own.