blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Do you know if your CEO’s email username and password are being sold on the dark web right now?

Alyssa Sisco

Do you know if your CEO’s email username and password are being sold on the dark web right now? How would you? Eventually, you’ll find out when you have to prevent finance from wiring a hacker - posing as your CEO - large sums of money. Or, you may find out after finance has already fallen for a CEO fraud phishing scam and wired a hacker money… But if there is a way for you to know when your CEO’s credentials are being sold in the first place, you ...

Read More
Topics: Security Threats, Data Breach, Network Security

The risks of unpatched applications and unsupported equipment

Alyssa Sisco

Everyday more technology processes are automated, saving us from performing tedious tasks over and over. However, the technology that helps us and makes our lives easier is also used by hackers and cybercriminals to take advantage of us. Hackers use automation to build bots that continuously search the internet for unpatched and vulnerable devices to infect. In fact, almost 30% of all internet traffic is made up of bad bots such as hacking tools, ...

Read More
Topics: Security Threats, Data Breach, Equipment Purchases, Network Security

What can a computer hack really cost you?

Alyssa Sisco

Being the target of a cybercriminal is not a fun experience for anyone, but it’s definitely a lot worse if you don’t have a plan to get back on your feet afterwards. Cybercriminals have caught on to the fact that small and midsize businesses don’t spend as much money on IT security, making them easier targets than large, multimillion-dollar companies. It’s important to note that 62% off all cyber-attacks are carried out on SMBs, according to IBM. Additionally, ...

Read More
Topics: Security Threats, Data Breach, Network Security

Why data backup is essential for your business

Alyssa Sisco

If you were to sell your company tomorrow, what exactly would you pass on to a buyer? More than just a company name on a building; You have records, contracts, contacts, financial data and more that go into making your business unique and valuable. It takes an incredible amount of time to acquire, develop and build that network of information. If disaster struck and your computer crashed, how long would it take you to get all that information back? ...

Read More
Topics: Data Breach, Owners & Managers, The Workplace, Network Security

Destroying your electronic media

Brooke Nielsen
The risks of not properly destroying electronic media, such as computer hard drives, video and audio tapes, etc. can include identity theft, possible HIPAA violations, loss of business reputation and client trust,  and more. Without destruction of these items that are filled with personal and company data, information could be sent to unintended recipients. Individuals, as well as businesses, have confidential information which they don’t want ...
Read More
Topics: Security Threats, Data Breach

HIPAA compliance is serious business

Frank

The government rules and regulations shaped by the Health Insurance Portability and Accountability Act (HIPAA) are continuing to evolve, which can make compliance difficult to measure.

Agencies in charge of compliance oversight and enforcement have ramped up enforcement over time knowing it was going to take a lot of time, both to develop the rules and regulations, and to circulate them throughout the health care industry.

We have now ...

Read More
Topics: Data Breach

Why criminals target small businesses

Brooke Nielsen
As a small to midsize business (SMB), cybercriminals would never take interest in our organization, right? – Wrong!

In recent years, smaller businesses have become the focal point of hackers interests. In fact, just last year it was reported that 43% of worldwide cyber attacks were against small businesses with less than 250 employees. These attacks usually involve hack attacks, Read More
Topics: Security Threats, Data Breach

BEC fraud: The threat you can't afford to ignore

Brooke Nielsen
Business E-mail Compromise (BEC), commonly known as “CEO fraud,” is a rapidly increasing concern affecting companies’ financial and data security today.

What exactly is BEC? It has been defined as a scam that targets businesses working with foreign suppliers and/or businesses that regularly use wire transfer payments. Scammers skillfully gain access to and impersonate company executives, attorneys, or suppliers through e-mails to ...
Read More
Topics: Staff Training, Security Threats, Data Breach

The increasing cost of a data breach

Tom Montgomery

We hear about hacking and compromised information at large organizations, yet what is the impact to small and midsize businesses (SMBs)? The article below provides insight on the impact a data breach may have on a business. In addition to citing the increasing costs of data breaches, there are a number of other factors listed which SMBs need to consider the impact of as well.

Read More
Topics: Security Threats, Data Breach