network security Tag

In a recent EY survey of IT professionals in oil and gas, 60% of respondents said their businesses had recently experienced a substantial cybersecurity incident. Most of these attacks used phishing and other forms of social engineering to spread malware and compromise user accounts and credentials. More than three-fourths (78%) of respondents said that a careless end-user was the most likely source of an attack. However,...

Read More
cyber insurance laptop

As we come to the end of Cyber Security Awareness Month its important to mention how you can protect your assets in the event of a breach. COVID-19 caused an incredible shift in business technology. Businesses are still working from home and moving to cloud applications. However, most employee home offices do not have strong information security practices in place. Hackers know this and as...

Read More

Certain legal firms, understandably concerned about insecurity in a cloud-based environment, avoid exposing their customers' confidential data to the internet, preferring to keep it on-premises on servers and server-based apps. Who is to say, however, that on-premise servers are more secure than cloud-based servers? When even enormous corporations with massive IT resources are hacked, no computer is completely secure. Except one that is not linked...

Read More

Cyber-Security is one of the most challenging aspects of running a small to medium sized business. With limited technical proficiency and resources small business owners often reach out to Managed IT Service companies to secure their systems and lessen risk. Still, not all IT Services companies have the expertise to provide expert cyber-security guidance to their customers. Small business owners should seek out IT providers that stay in...

Read More
zoom hacked zoom bomb

Employees around the world are working remotely full-time during the COVID-19 pandemic. Many are turning to applications like Zoom to meet online. Unfortunately, cybercriminals see this trend as a new opportunity to attack people for profit. Therefore, you must protect these platforms so your company is safe from costly and embarrassing security breaches.  Common video conference attacks:  Video Bombing: This involves uninvited guests disrupting your meetings. They may show inappropriate images, shout...

Read More

Phishing emails are an attempt to gain access to sensitive or personal information such as usernames, passwords, financial or personal information by criminals who have disguised themselves as a legitimate person or business. The intent is to use this information for illegal activities. Phishing has been around for nearly 20 years, first used as a phrase sometime around 1996 by hackers stealing America Online information....

Read More
IS YOUR BUSINESS PREPARED FOR AN UNEXPECTED CLOSURE?

In today’s world every company should have a solid business continuity plan. COVID-19 caused many businesses and schools to close their doors, employees and students continue to attend meetings, classes and training remotely. Large events have been canceled, and crowded offices are still discouraged. Everyone found themselves asking is my business set-up to properly handle its remote workforce? Review the questions below to determine what you...

Read More
10 REASONS TO UPGRADE YOUR FIREWALL

Firewalls are one of the best methods for identifying and stopping cyberattacks, including advanced threats like malware, ransomware and encrypted threats. But firewalls must be regularly updated to keep pace with the fast-moving cyber arms race. Explore the top 10 reasons to upgrade to the latest next-generation firewall to save costs, increase speeds, boost performance and productivity, and mitigate the most advanced cyberattacks. Stop the Most Advanced...

Read More