Just about everything you do online requires a password. Passwords make sense in that you don’t want someone to access, say, your bank account. But what is the best way to create a strong password?
by Maria Catricala, on Aug 11, 2021 9:47:22 AM
Just about everything you do online requires a password. Passwords make sense in that you don’t want someone to access, say, your bank account. But what is the best way to create a strong password?
by Maria Catricala, on Aug 6, 2021 8:00:00 AM
MDR is an acronym for Managed Detection and Response. You will also hear people talk about EDR, (Endpoint Detection & Response), and XDR, (Extended/Anything Detection & Response). MDR, EDR and XDR are designed to act as an early warning system, letting you know in real time if something bad is happening against your network or systems. In some cases, MDR, EDR and XDR can be configured to automatically respond on your behalf.
by Maria Catricala, on Aug 4, 2021 8:00:00 AM
When you opened your business, you knew you needed some basic insurance, like fire and theft, but have you thought about cyber insurance? Wikipedia defines cyber insurance as, “a specialty lines insurance product intended to protect businesses, and individuals providing services for such businesses, from Internet-based risks, and more generally from risks relating to information technology infrastructure, information privacy, information governance liability, and activities related thereto.”
by Maria Catricala, on Jul 30, 2021 10:16:37 AM
You may have heard about companies who take to shaming employees who have unintentionally caused a cyber incident at work. While it’s true that all it takes is one wrong click by a staff member, shaming staff isn’t the way to better cyber security.
by Maria Catricala and Dave Millier, on Jul 28, 2021 10:24:20 AM
Many business owners, especially of SMBs, take to the wearing of many hats to grow a successful business. They feel they need to do it all themselves. But is this true about cyber security? Can you do it all on your own? Should you do it all on your own?
by Maria Catricala, on Jul 26, 2021 1:10:41 PM
Ransomware is malicious software designed to make your computer inaccessible by encrypting all of the files and holding them hostage for a substantial ransom. If your computer is connected to a network, it will usually try to spread to any other computers on the network and infect their files too. Recently, Colonial Pipeline and JBS Foods suffered ransomware attacks that affected production and forced those companies to pay a huge ransom.
by Maria Catricala, on Jul 23, 2021 10:37:56 AM
What are phishing attacks? Phishing attacks are a social engineering method to either fraudulently obtain your information or to trick you into downloading malware. The goal of the phisher is to compromise your network or data. Phishing attacks work because they disguise their communication or web pages as being from a trusted source, making you believe the request is real and prompting you to take an action like clicking on a bad link or giving up information.
by Maria Catricala, on Jul 21, 2021 10:27:50 AM
Ransomware isn’t a new threat to business. It has been around for a long while, but lately it seems we are bombarded with news stories about ransomware. Two recent ones of note have been the cyber attacks on Colonial Pipeline and JBS Meats. In both cases they agreed to pay the ransom. So, why is this a problem?
by Maria Catricala, on Jul 19, 2021 11:50:34 AM
Many people believe that cyber security is an expensive luxury item that only large enterprises can afford. They think that as a small enterprise “we don't have anything of value anyone would want to steal?” or that “we are too small and unimportant to be targeted by cyber criminals.”
by Maria Catricala, on Jul 16, 2021 9:53:00 AM
Many businesses have started to make the switch from company-provided equipment to Bring Your Own Device (BYOD). As an employer, this has many advantages: you don’t have to buy your employees a device to work on and the employee gets to use whatever form factor they’re comfortable with and used to, be it Microsoft or Mac, smartphone, tablet, or laptop.
Get the latest information and cyber security news here!