Archive

You Got Phished and Took the Bait: Now What?

There are a number of email scams out there, ranging from emotional appeals from Nigerian royalty to notifications that you just won the lottery in London – even though you’ve never purchased or made an entry. Fortunately, greater education, awareness and suspicion of these types of email scam messages have helped protect a number of SPAM recipients. While many of these Internet email scams are just digitally updated con games that have been around since before the first World War, the con artists are getting smarter and attempting to work around your suspicions by taking the wolf in sheep’s clothing…

Read more

Understanding the Different Types of Spam

There are many different types of spam and it is important that you understand the different types in order to better protect yourself from it. If you aren’t familiar with all of the ways spam is delivered, take a look at the different types below. The more you know about spam, the better you will be able to protect yourself from it. Spam in Emails Spam in email is something which we’re quite knowledgeable about. Just about everyone is familiar with the email spam and if you haven’t been subjected to it, then you are one of the lucky ones. These emails…

Read more

The Latest E-Mail Scams Target CEOs and Cost Businesses Billions

It seems you’re always reading about a new email scam every week that fools office employees. Some of those, however, have a lot of clues now that indicate they’re phishing scams. In that regard, employees are a little more on guard on catching email scams while working. Yet, the creators of those emails are always finding new ways to evolve their dirty work so it keeps fooling more people. One of the most recent email scams targets CEOs rather than employees. You can see the devious nature of this type of email based on the idea that it doesn’t use the typical…

Read more

Recover From Disaster Before it Strikes

Having a major incident is something no one looks forward to. But, not looking forward to, and intentionally avoiding discussing it are two entirely different things, and the key to recovering from a disaster is to have the discussions and implement the plans that arise from them today. Everyone hopes that it won’t happen to them, but with climate change, international terrorism, hurricanes, tornadoes, tsunamis, computer error, acts of God, and other disasters happening at an ever-increasing pace in the modern world, it is foolish to think that it won’t happen to you. And the best way to ensure that you can…

Read more

Network Security is Crucial for Small Businesses

Most business owners know how to think about physical security. They install security cameras over their cash registers, change locks when key employees leave and take cash to the bank whenever it reaches a certain amount. Unfortunately, many business owners don’t know that computer & network security are as important to the survival of their business as physical security. Many businesses see more money pass through their networks than through their cash registers. Online banking logins, wire transfer instructions, credit card transactions and ACH transactions all flow through a typical business network. Unfortunately, hackers and cyberthieves target all of these types of…

Read more

Network Security Involves More Than Just Protection From a Cyber Attack

Most businesses know the importance of network security. Protecting the company’s data from a cyber attack or malware is a priority.  However, a recent case in Indiana demonstrates that security also means protecting data from internal error. A minor programming glitch at the Indiana Family and Social Services Administration (FSSA) led to the exposure of more than 185,000 client records, including confidential health care data protected under HIPAA. The Problem FSSA officials acknowledged this month that the HIPAA breach had taken place, assigning accountability to the organization’s technology contractor. They assert that a programming error was made in its document management…

Read more

Network Security: How Google Can Help Defend Against Sony-Style Hacking

You’re probably quite familiar by now how hackers, most likely from North Korea, broke into Sony’s network to steal confidential information, disrupt service, and cause general mayhem. You’re resigned to something like that happening to your business someday, thinking true security isn’t possible against determined criminals. Actually, there is something you can do and Google can help. Your first line of defense against any such intrusions consists of the hardware and software that you use to run your business. So before you buy any new devices or applications, take the time to research how adequate their built-in security features are….

Read more

Email Scams: The FBI Says Businesses Are Losing Millions from Being Duped

The worst type of email scam today is one that not only fools employees in companies, but also the executives. And that’s exactly what’s happening now, despite so many being aware of how dangerous email scams are. As the structure of many companies becomes increasingly more complex, more business dealings occur via email. With so many email scam artists creating emails that look legitimate, it becomes extra challenging trying to decipher what’s real and what isn’t. This is even more prevalent with companies dealing with international business deals. With so many email scams coming from foreign countries, a company dealing in international…

Read more

Disaster Recovery Terms You Need to Know

Like nearly everything else, disaster recovery comes with its own vocabulary. If your company is designing its disaster recovery plan or you’ve experienced a disaster, knowing the following terms and what they mean can help, according to a recent article by SearchServer Virtualization. Disaster recovery. This is perhaps the most important term of all. It’s the plan you create in order to minimize the effect of a negative event, whether the event is technological, like a virus, or natural, like a fire or an earthquake. Failover. When your primary operational mode has been compromised, you rely on a backup one,…

Read more

Cloud Computing: When Disaster Strikes

Cloud computing has had some misconceptions through 2014 that have snowballed to a point where people stop using this solution. Despite the Apple iCloud scare this year, everyone has to keep in mind no technology is perfect if it’s not used correctly. In the case of any security concerns, it’s all in how you monitor the cloud whether it becomes safe or not. With proper management, security lapses don’t have to happen. And when unexpected disaster strikes, the cloud becomes all the more important in how useful it is in helping a business get back on its feet. Natural Disasters With…

Read more