Small Business Cybersecurity Checklist Part 3- Further Considerations

In the first and second posts of this three post series, we looked at the essentials “must-haves” of small business cybersecurity, and then at a more advanced list of “better-haves.”  In this final post we will look at some advanced concepts and planning that typically are part of the cybersecurity process at larger enterprises. For a small business owner, this may seem like a lot to go through, but again, working with a cybersecurity professional or firm that specializes in ...

Continue Reading →
0

Small Business Cybersecurity Checklist Part 2-Recommended Additions

In our last post we looked at the eleven must have items that a company ought to have in place to meet the bare minimum of cybersecurity essentials.  In today’s post we are looking at another ten highly recommended cybersecurity practices.

  • Beware of emails bearing links or attachments, or that are requesting personal information, user credentials, or credit card or banking information.  It is a good practice to call the sender to confirm the contents on any attachment or the destination ...
Continue Reading →
0

Small Business Cybersecurity Checklist Part 1–Bare Minimum

Small businesses and organizations are generally lagging behind their enterprise sized counterparts when it comes to cybersecurity.  Over the next three posts we will look at the actions small business owners and managers should undertake to security their digital assets.

A large part of the reason that small businesses are lagging in cyber security is due to the fact that small owner-managed businesses are generally focusing time, energy, and capital resources at the core purpose of their business:  selling more of ...

Continue Reading →
0

Sunday Funnies: Interstellar Rapper “ChugGer”

So the Rosetta spacecraft has successfully mated with Comet 67P/Churyumov-Gerasimenko (aka ChugGer).  Well except for the part where the lander is in a shadow and the solar panels are not getting enough light to charge the battery.  Oopsy!  One of the many interesting new things we are learning is that this particular comet is “singing.”  And they said “in space no one can here you scream.”  I guess not.  Anyway, drift ...

Continue Reading →
0

Lets Go Phishing–5 Steps To Empty Your Bank Account

Cybercriminals have lots of ways to exploit their victims, but the single most effect method to gain initial entry remains the phishing email.  If you want to protect yourself from these sorts of exploits you need to know what they look like and what happens if they trick you into responding.  Let’s take a look at a scenario where the bad guys are trying to get your online banking credentials.

  • Step 1:  Cybercriminals will send out a realistic looking but fake ...
Continue Reading →
0

Cybersecurity: What’s Left – Avoidance, Prevention, Detection and Removal

On the Internet, as in real life, there are basically three ways to stay out of trouble, or at least get out of trouble.  They are avoidance, prevention, and then detection and removal.

  • Avoidance – this is actually the easiest and best solution to cybersecurity.  Learn what trouble looks like, and avoid contact.  If you want to avoid malware intrusions, learn how to recognize clever phishing emails and resist the urge to click on a link or open a file attachment ...
Continue Reading →
0

Researchers Discover 17,000 Macs in a Botnet

Image result for apple logoPeople who use Apple computers operate under the assumption that they are invulnerable to malware attacks.  This information is reinforced by the Geniuses at the Apple Store, or so I have been told by more than one of my Mac-based clients.  But we have been warning for several years now that this is no longer true.  This must be ...

Continue Reading →
0

95% of Cybersecurity Breached Due to Human Error

“A recently released report from computing giant IBM attributes some 95% of IT security breaches to human error and that over 75% of attacks are targeted at just five industries, proving when it comes to security, people are the real problem”

This just proves once again that when it comes to cybersecurity, training and education for your employees is going to provide a bigger return on investment than anything else you can do.  Most attacks start as email or ...

Continue Reading →
0
Page 99 of 147 «...708090979899100101...»