Blog

Phishing for Corporate Gold with Social Engineering Attacks

Completing our look at the 7 common-sense cyber protections with #5 and #6: #5 DO NOT open emails, links, or attachments from strangers – especially if the email demands urgent action from you. Stop and think, that email could be a "phishing" email from a cyber attacker #6 DO NOT give any of your usernames, passwords, or other computer...

Instant Efficiency Gains With Updated Active Directory Data

Millions of businesses around the world either have used or are using Microsoft Active Directory (AD) services on their corporate networks. Used to identify and manage authorized network users, AD has been around for over fifteen years. However, few companies take full advantage of AD's capabilities in the social media age. With a few simple tweak...

Just what is a complex password (and how do I create one)?

In a previous blog, I discussed seven common-sense cyber protections you can do that immediately and inexpensively make you, your business, and your family safer from cyber attack. So far, I've covered #1 – Keep your software patches up to date and #7 – Do not give your primary user account administrator privileges, and #3 – Back up your computer ...

Which is worse: #ransomware or hard drive failure?

It’s a trick question. Both impact your business the same way – you lose access to your valuable business data when you are not expecting it. One of the most important things you can do about cybersecurity is to stop thinking about it like a mysterious disease whose only cure is to buy specialized protection software. To be sure, some businesses that...

7 Common-Sense Cyber Protections That Really Work

We all use the Internet regularly to communicate with colleagues, share vital information, and carry out our business duties. Think of trying to get through your workday without access to your e-mail, your documents, or your spreadsheets. Nevertheless, that same Internet we depend upon is viewed by cyber criminals as a pathway into your company – one ...

The 2 Things That Best Protect You From Cyber-Attack

We are excited to announce a NEW guest blog series by Dr. Ken! In future blog posts, he will discuss ransomware, encryption, and other critical cyber-security issues all business people need to know. Stay tuned! UPDATE Friday May 12, 2017: Massive ransomware cyber-attack hits 74 countries around the world says a headline in today’s UK Guardian news...

The Walled Garden

Safety in numbers. It is a proven survival principle that has, well, survived for eons. Encapsulated in this principle are many worthy lessons, such as implicit trust and resource pooling. These lessons are easily seen in the security concept of a Walled Garden. This defense model can be traced back to when 17th century townships were designed aro...

The Surprising Reasons Small to Midsized Businesses Are Moving to Windows 10 Enterprise

Owners of small-to-midsized businesses (SMBs) view their information technology (IT) as a necessary evil. For example, most SMBs dread the cycle of upgrading old laptops and desktops every few years (IDC notes that PC sales in 2017 are the strongest they've been in five years) to keep up with the latest version of Microsoft Windows. For decades, l...

Defend Your M&Ms: How To Find Your Organization's Cybersecurity Sweet Spot

Today’s young professionals have a more mobile, just-in-time work style. However, many companies find their current security models slow to adapt to these modern scenarios. A great analogy I heard in a recent security conference compares life to the famous candy that melts in your mouth—not in your hand. Hard crunchy shell, chewy cente...

How to keep contingent staff working without full access to your network

The modern workplace offers unprecedented flexibility. Where employees once had to be working on premise, many can now work remotely. With the rise in remote work has come a rise in contingent staff, usually contractors with a specialty they can often do from afar, without being in your offices or using your machines. The best part is, you as a business o...