Tag Archives: cybersecurity

Cybersecurity in Challenging Times

In these unprecedented times, we spend more time than ever on various devices, using them both for work and recreation. As in other difficult times, heroes rise to the occasion. However, so do bad actors, seeking to take advantage of the situation. Read on to learn more about protecting yourself from cyber attacks.

Hazards to Watch For

Cyberattacks are on the rise these days, with bad actors looking to take advantage of the situation, playing both on people’s fears, and their desire to help others. As ever, though, we can protect ourselves using tools along with caution and common sense. Social engineering schemes, including phishing attacks, are used to gain confidential information from unwitting victims or to install malware on their devices. For instance, a person might receive emails that look like ones from credible organizations, and these emails capitalize on fears of COVID-19. Cybercriminals might use “spoofing” as a tactic, making an email seem like it’s from someone you know. It might contain an urgent appeal to buy items for a relative because the “sender” is in quarantine. Other possibilities are ads for items like masks or stories about vaccines and cures for COVID-19. 

Keep Your Network and Your Employees Secure

Many businesses now have employees working remotely, accessing the business’ computer network. The first tool that can help keep the network secure is a virtual private network (VPN) that workers can use to safely access files and applications. Other tools that should be part of the arsenal are current antivirus and anti-malware definitions. Remind workers of common-sense precautions like not clicking on links or attachments. If they receive a strange email that appears to be from a supervisor or coworker, they can call to find out if the email is genuine. If it isn’t, they need to report and delete the email. They can point the mouse arrow over the URL to see if that looks suspicious, and refrain from responding to the email. Just being aware that cyber attacks are on the rise can help workers keep their guard up. An option to test workers’ knowledge of phishing attacks is staging a mock attack to learn which people respond, and in what way.

A great writer said that people need to be reminded rather than instructed, and this can apply to cybersecurity. To learn more about how to keep your network and your employees safe, contact your trusted technology advisor today. 

Getting Your Business Ready for 2020 Information Technology Trends

Last year at this time, it was predicted that technologies like 5G and Internet of Things would be developing trends. This is still true.  According to a survey by CompTIA, the global tech industry is set to grow at a rate of 3.7%, reaching $5.2 trillion. The United States technology market accounts for nearly a third of that, with an expenditure of $1.7 trillion expected in 2020. Read on to learn more about business’ approach to the adoption of these new technologies.

New Technologies Making Inroads in 2020

While technologies of infrastructure and software development (Internet of Things and Artificial Intelligence, respectively) will continue to gain ground, for many businesses they are secondary to the infrastructure and software development that already exist. Some other emerging technologies mentioned by CompTIA include software development (Software as a Service, for instance) and big data analytics. These technologies that are coming to the fore may drive revenue growth, once they are integrated with already-present technology to create innovative solutions.

The Four Pillars of Information Technology

According to an IDC survey, companies plan to orient their technology spending to four “pillars” of information technology: software development, cybersecurity, data, and infrastructure. Of the companies surveyed, 57% plan to focus on software development. With the infrastructure already in place, along with the users and connectivity being available, U.S. companies can focus on developing the software and services supported by this foundation. Cybersecurity follows close behind, with 51% of surveyed companies focusing on expanding their defenses against cyberattack and establishing internal processes and policies to keep their operations secure. A portion of companies (47%) will choose to focus on data, especially predictive analytics and database administration, springboards from which they can analyze the data already available. Lastly, in terms of infrastructure, cloud computing will play an important role, not as an emerging technology but one that can contribute to a company’s IT architecture (including networks and storage) and connected to infrastructure that already exists.

Cybersecurity is Still A Key Consideration

With all these new developments, cybersecurity is still an issue to be addressed. With numerous devices connected to the Internet, in the case of IoT, and more and more data from these connections, cybersecurity will still be crucial.  According to the survey, the most prominent area in the cybersecurity pillar will be the gathering and analysis of cybersecurity analytics, helping to give a business a picture of how secure its network is and possibly how ready a company is to adopt emerging technologies.

For an evaluation of your company’s readiness for 2020 technology trends, contact your trusted technology advisor today. 

October is Cybersecurity Awareness Month: Be Aware and Prepared

October is National Cybersecurity Awareness month, a “collaborative effort between government and industry to raise awareness about the importance of cybersecurity, and to ensure all businesses have the resources to be safer and more secure online.” This year, according to the US Department of Homeland Security, the emphasis is on a proactive approach. Read on to learn more about various aspects of cybersecurity.

Develop Awareness of Current Security Threats

The more technology advances and expands, the more places an attack can occur. Cybercriminals are growing more clever and resourceful, and know how to insert malware, or a bot that can mimic human activity. There are also phishing schemes, wherein an attacker can send an email persuading an unwitting employee to share confidential data. Weak spots in a network are subject to exploitation as well. Many companies, according to CompTIA, think that security is “good enough,” and haven’t yet dedicated much of their budget to maintaining cybersecurity. However, your business doesn’t have to be one of them. There are steps you can take, starting with an assessment of your network’s security.

Take an Inventory of Current Protections

What is your current level of security? Take stock of your business’s protection, starting with the computer network. Are there any weak spots or vulnerabilities needing to be patched? Make sure that you have the most current operating system patches. Also ensure that your antivirus and anti-malware definitions are current, to block attackers from infiltrating your system. Map all devices connected to your network, including ones operated by staff working remotely to make sure that those points are safe. Do your employees know the best practices for keeping safe while working online?

Make Employees Your Most Important Asset

Not only should devices be secured from unauthorized access, your employees should know—and practice—skills that will keep them and you safe from cyberattack. Phishing schemes are designed to persuade unwitting individuals to provide confidential data to attackers. Train them to know what a phishing attack looks like; clues include misspellings in the heading as well as an urgent “call to action.” Other solid practices include establishing strong passwords as well as changing them regularly. Multi-factor authorization (where the user enters information that only they know) can provide an additional layer of protection. Emphasize to your staff that protecting themselves also protects your business.

As technology evolves, cybercriminals will keep pace in exploiting it. To learn more about how to keep your network safe and healthy, contact your trusted technology advisor today.

Protect Your Business Through Cybersecurity Awareness

October is Cybersecurity Awareness month and knowing this can serve as a wake-up call to protect your company’s data, networks and systems from internal and external hazards. Read on to learn more about protecting your business.

Cybersecurity—An Overview 

The overall goal of cybersecurity is protecting a business’ computer systems from attacks and intrusions, and your data safe from loss or compromise, preserving your business’ revenue and reputation. While natural disasters are always a factor–and preparing for them is a piece of the IT security puzzle—manmade hazards like viruses and malware are just as important to guard against Cyberattack. Not only that, phishing attempts—emails designed to get an unwitting recipient to supply private information—are a common threat. Fortunately, plenty of protections are available to help safeguard your business’ technological assets.

Tools Can Help Keep Your Business Secure

Many resources are there to help you protect your business and its network. Antivirus and anti-malware definitions, kept up to date, can guard your system against the newest threats. Operating system patches can protect weak spots in your system and should also be as current as possible. Network monitoring helps keep track of possible intrusions as well as bottlenecks that slow down data transmission. Last, but not least, your staff can be a key part of your strategy, if they are trained to recognize potential hazards.

Enlist Your Employees in Fighting Cyber Attacks

Your human resources have the potential to be a resource in maintaining the information security of your business. If well trained, in what to recognize and how to report it, your employees can protect you from an attack. Impress upon them the benefits of having a secure network; that it keeps their work running smoothly instead of experiencing downtime.

Many tools are available to keep your business’ network safe from cyberattack, and your staff also plays a key role in your cybersecurity strategy. To learn more and to develop or refine your plan, contact your trusted technology advisor today. 

Cybersecurity is Everybody’s Business

Cyber SecurityIt is no surprise, technology flattens the world for many businesses. What’s more, nearly every business sector finds it necessary to collect, maintain, analyze, and monetize user data. Many think Cybersecurity risks only apply to highly regulated industries, such as legal, healthcare and financial services.

Cybersecurity Risks Go Beyond Borders

Factors outside industry, including geographic considerations and sensitive consumer data, can create cybersecurity risks that need to be managed. These factors run the gamut of domestic and international laws, regulatory bodies, and private-party business agreements. Cybersecurity compliance can touch every business to some degree.

Internet of Things (IoT) and Cybersecurity

Adding to the list of concerns are non-traditional technologies entering your businesses network. IP-enabled technology called Internet of Things (IoT) is rapidly being adopted in the workplace.  The Cybersecurity threat is moving beyond desktops, laptops and services. A new generation of mobile devices–Point of Sale (POS), IP video surveillance, embedded sensors, VoIP, and others–is just the first wave of emerging technologies that need to be secured.

How to Minimize Cybersecurity Risks

There are many things a business can do to reduce Cybersecurity threats. According to the Computing Technology Industry Association (CompTIA), the following elements are the building blocks for a cybersecurity program:

  • Documented policies, procedures & standards

  • Asset management

  • Identity & access controls

  • Risk management

  • Vendor management

  • Physical & environmental security

  • Compliance

  • Privacy

  • Remote access

  • Data backups

  • Data destruction

Cybersecurity threats are a reality of today’s world. The risks of data compromise and/or loss can cost more than dollars; such risks can cost your reputation. Your business is only as secure as your Network. If you have questions about your business needs, ask your technology advisor about how to manage Cybersecurity threats to your business.

Findings Link Network Security to Human Error

Network SecurityHow secure is your network? A recent study by CompTIA links human error as the primary cause of security breaches. In fact, human error is at fault 58 percent of the time, as compared to technology error occurring 42 percent of the time. This survey of over 1500 business and technology executives points to the need to teach staff the importance of Network Security.

Continue reading Findings Link Network Security to Human Error