Another contribution from my pins on Pinterest.
Continue Reading →
In the first and second posts of this three post series, we looked at the essentials “must-haves” of small business cybersecurity, and then at a more advanced list of “better-haves.” In this final post we will look at some advanced concepts and planning that typically are part of the cybersecurity process at larger enterprises. For a small business owner, this may seem like a lot to go through, but again, working with a cybersecurity professional or firm that specializes in ...Continue Reading →
In our last post we looked at the eleven must have items that a company ought to have in place to meet the bare minimum of cybersecurity essentials. In today’s post we are looking at another ten highly recommended cybersecurity practices.
Small businesses and organizations are generally lagging behind their enterprise sized counterparts when it comes to cybersecurity. Over the next three posts we will look at the actions small business owners and managers should undertake to security their digital assets.
A large part of the reason that small businesses are lagging in cyber security is due to the fact that small owner-managed businesses are generally focusing time, energy, and capital resources at the core purpose of their business: selling more of ...Continue Reading →
So the Rosetta spacecraft has successfully mated with Comet 67P/Churyumov-Gerasimenko (aka ChugGer). Well except for the part where the lander is in a shadow and the solar panels are not getting enough light to charge the battery. Oopsy! One of the many interesting new things we are learning is that this particular comet is “singing.” And they said “in space no one can here you scream.” I guess not. Anyway, drift ...Continue Reading →
Cybercriminals have lots of ways to exploit their victims, but the single most effect method to gain initial entry remains the phishing email. If you want to protect yourself from these sorts of exploits you need to know what they look like and what happens if they trick you into responding. Let’s take a look at a scenario where the bad guys are trying to get your online banking credentials.
On the Internet, as in real life, there are basically three ways to stay out of trouble, or at least get out of trouble. They are avoidance, prevention, and then detection and removal.
People who use Apple computers operate under the assumption that they are invulnerable to malware attacks. This information is reinforced by the Geniuses at the Apple Store, or so I have been told by more than one of my Mac-based clients. But we have been warning for several years now that this is no longer true. This must be ...Continue Reading →
“A recently released report from computing giant IBM attributes some 95% of IT security breaches to human error and that over 75% of attacks are targeted at just five industries, proving when it comes to security, people are the real problem”
This just proves once again that when it comes to cybersecurity, training and education for your employees is going to provide a bigger return on investment than anything else you can do. Most attacks start as email or ...Continue Reading →