5 Things to Prepare for a Security Incident

Network Security

You’ve heard the saying, “Failing to plan is planning to fail.” When it comes to your business network, that phrase could not be truer. Planning for a security incident is a vital piece of your network’s health. Most small businesses employ outside IT support, who won’t always be onsite at the start of a security […]

Leaked NSA Report Shows Users are Highest Security Threat

Data Backup

We have mentioned the human firewall on this blog before. This week an NSA report on Russian efforts to hack the computers of U.S. election officials before the 2016 presidential election was leaked to the media. The findings in the report testify to the fact that users are still the weakest link in a company’s security […]

McAfee Returns to Independence

Intel, who purchased the security company McAfee back in 2011 for 7.7 billion dollars, is now spinning it off into it’s own company again. Intel still owns 49% of McAfee, and is looking to continue it’s involvement with McAfee’s growth. As one of the leading antivirus companies in the world, McAfee looks to rely on […]

Security Risks of Smart Devices

We made a joke a while back about everything getting so smart that even water bottles will have smart features. The day has come that there ARE water bottles with smart features! Each device you connect to your network, though, opens you up just a little bit more to an attack. It might not even […]

Keep Your Passwords Secure

Passwords

As a managed IT support company, we can tell you that we’ve seen (and heard) our fair share of password no no’s. There’s nothing that will shake our heads faster than approaching someone’s workstation and the passwords to their computer is on a sticky note on the monitor. What is even the point of having […]

Misaligned Cyber Security Defenses: Are You at Risk?

Recently Intel Security and the Center for Strategic and International Studies surveyed 800 cyber security professionals from five major industry sectors in nine countries, and put together an extensive report about how the attack and response to cyber criminals is not matching up. A good portion of the problem is between corporate executives and the IT professionals that […]

Learn to Spot a Scam – Email Edition

Spot a Scam

One of the easiest ways for hackers to gain access to your company network is through individual employees. How well can you and your business employees spot a scam? This month the ransomware called CryptoLocker is making the rounds again in a massive way. Ransomware takes over a computer or a network and demands money […]

Amazon Service Brings Thousands of Companies Down

On Tuesday this week AWS (Amazon Web Services) suffered an outage that left several websites and services down for hours. This was not the work of hackers or a DDoS attack though, it looks like the S3 service took a nose dive on the east coast which caused even isitdownrightnow.com (a site dedicated to letting […]

Top 5 Security Threats

If you watch television, you may have been swayed to believe that the top security threats on your computer network is intentional sabotage or unauthorized access to data and or equipment. This may hold true for some businesses, however for most organizations there are other threats that should be taken very seriously. Top Security Threats […]

New Age of Passwords Involves Brain Passwords?

As far as computer security is concerned, passcodes, Touch ID, and iris scanning are so September 2016. These days, it seems all the cool kids are looking at brain wave detection as the next frontier in unbeatable passwords. Brain passwords are a thing of the future and might be the most secure option to date. That’s certainly what Abdul […]