A Healthy Level of Skepticism

Email phishing scams are on the rise in the first quarter of 2018. With the rise of cybercriminal attempts to hack systems or harvest data using phishing emails, we wanted to cover the most basic steps a company or individual should take to protect themselves against these sophisticated scams. According to Phishing.org, “Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.” The concept is very …

Encryption: What it is and Where it’s Going.

In order to demonstrate private and public key encryption, it is best to have a cast of characters. Meet Alice, Eve, and Bob.     Alice wants to send Bob some sensitive information. Eve has been trying to get this information from Alice. She has been watching her communications in anticipation. How can Alice send this information to Bob without Eve seeing the information? Let’s assume that Alice and Bob are not able to meet in-person, so physically handing off the information is not an option. Symmetrical Key Encryption If this were a physical box containing sensitive information, then Alice …

Why Patch?

In our past posts, we’ve discussed the importance of educating your employees on proper cybersecurity protocols, but there is one aspect of user behavior that can be easily overlooked, yet is critically important: updating and installing patches. What is a patch? A patch is a piece of software that is designed to update a computer program or its supporting data. Patches can be updated manually or automatically.  Patches are sometimes aimed at improving the user experience, adding new features, eliminating known bugs, or fixing known security vulnerabilities. The latter of these intentions is the main focus of this article. You …

Mobile Device Security

More and more small businesses are offering mobile devices to their employees as a means of increasing productivity and improving efficiency. It should not surprise you that these devices, and those belonging to the employees, pose a potential security risk to the network infrastructure. One survey found that 45% of businesses do not have a policy or plan to provide IT support for these devices. Businesses need to acknowledge the threat that mobile devices pose and take preemptive action to avoid the costly downtime, diverted resources, loss of data, and damage to the company’s public image that a malware attack …

How Do I Secure the Cloud?

Cloud security spending has been growing at an annual rate of 28% according to Forrester Research. By 2021, cloud security spending will be at $3.5 billion. Some of the biggest spenders are the financial and healthcare industries. The Forrester report states, “We expect most companies to look to commercial off the shelf solutions for their cloud security needs.” These off the shelf solutions are becoming more and more available as the cloud security market expands, but not all companies have made the move to secure the cloud. (Cloud security spending to hit $3.5bn by 2021, says Forrester  By James Bourne). …