blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

How much information is on your IoT devices?

Joel Havenridge

You wouldn’t throw your financial paperwork in the trash without shredding it - or at least, you shouldn’t. Because you know that if someone got a hold of that information, they could potentially steal your money. But what about your IoT devices? Are you as careful when disposing of them? How much information is on smart devices you’ve connected in your home? When it comes time to get rid of them, there may be enough information left on them to open ...

Read More
Topics: Security Threats, Network Security

Do external devices have access to your business's internal network?

Alyssa Sisco

Any infected device that is connected to your internal network has the potential to infect all the other devices on that network. Last week, a third-party vendor brought in a device that when connected to CHI Health’s network, introduced malware to their system. The virus spread to different devices at some of their hospitals and clinics and affected browsers attempting to connect with the health system’s network.

Read More
Topics: Security Threats, Network Security

Do you know if your CEO’s email username and password are being sold on the dark web right now?

Alyssa Sisco

Do you know if your CEO’s email username and password are being sold on the dark web right now? How would you? Eventually, you’ll find out when you have to prevent finance from wiring a hacker - posing as your CEO - large sums of money. Or, you may find out after finance has already fallen for a CEO fraud phishing scam and wired a hacker money… But if there is a way for you to know when your CEO’s credentials are being sold in the first place, you ...

Read More
Topics: Security Threats, Data Breach, Network Security

What we can learn about cybersecurity from the government shutdown

Alyssa Sisco

Amid the current government shutdown, over 80 government websites are either down or insecure. With no IT staff around to renew their TLS (Transport Layer Security) certificates, many government websites are being left open to vulnerabilities. Some of the sites are set up so that they become inaccessible to the public if their TLS certificates are not up-to-date. Yet, others simply warn users that the site is not secure, then allows you to bypass the warning ...

Read More
Topics: Owners & Managers, Network Security

Keeping your systems safe with Duo multifactor authentication

Tim Albertus

With today’s cutting-edge cybercriminals, it's always better to be safe rather than sorry. Hackers have been getting sneakier when it comes to gaining access to one’s system. They not only use brute force attacks or dictionary attacks but also search social media profiles for information you would be likely to use as a password (it is ...

Read More
Topics: Network Security

Monitor internal threats with Cyber Hawk

Alyssa Sisco

Let’s say you eat healthy, exercise, drink water, get eight hours of sleep every night, take vitamins and get your flu shot. Can you be 100% certain that you’re not going to get the flu this year? No. But each step you take towards being healthy, strengthens your immune system and lowers your risk of getting sick. In IT, we call this a layered approach. There is no one tool you can use to guarantee your business’s safety from a cyber-attack, but you can take ...

Read More
Topics: Network Security

The risks of unpatched applications and unsupported equipment

Alyssa Sisco

Everyday more technology processes are automated, saving us from performing tedious tasks over and over. However, the technology that helps us and makes our lives easier is also used by hackers and cybercriminals to take advantage of us. Hackers use automation to build bots that continuously search the internet for unpatched and vulnerable devices to infect. In fact, almost 30% of all internet traffic is made up of bad bots such as hacking tools, ...

Read More
Topics: Security Threats, Data Breach, Equipment Purchases, Network Security

IT Security in the Information Warfare Age

Galen Winkler

Back in August, Wired Magazine published a fascinating look at the NotPetya attack and more specifically its unforeseen effects on the shipping giant, Maersk. The article itself is worth a read if you are interested in IT security, but more pertinent to small and medium business owners is this lesson:

Damaging cyber-attacks propagate themselves quickly without any human intervention, and may go well beyond their original intended targets, so ...

Read More
Topics: Network Security

How to keep your business secure while allowing staff to work remotely

Alyssa Sisco

With the right company culture and technology tools, it’s possible to work effectively and efficiently while outside of the office. Given access to email, chat, video conferencing, cloud collaboration tools, and more, there aren’t a lot of office jobs that can’t be done off-site. Studies show that flexible work options reduce turnover, improve morale and to top it all off, over two-thirds of employers report increased productivity among their ...

Read More
Topics: Owners & Managers, Trends, Network Security

How to identify Social Engineering

Alyssa Sisco

Social engineering involves the manipulation or deception of people in order to obtain information or access they shouldn't have. Social engineers could be after a password, bank account information, access to your corporation's network or anything else that could benefit them. Their end goal could be to steal money, company secrets, to disrupt your business or to shut it down entirely.

Because social engineering preys on human behavior, it's ...

Read More
Topics: Staff Training, Security Threats, Network Security