The IT Support Learning Hub
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
Microsoft research shows that 90% of all compromised passwords come from a data breach. You read that right - 90%! Criminals use tools that can guess thousands of passwords a minute. Their goal is to wreak havoc on your network and steal your trade secrets. But, not all these criminals are hacking masterminds. These attacks can also be a result of a coworker or family member snooping around.
The Internet has changed how we do business, and along with everything else that your IT department does, they have the challenge of keeping your network safe. With the growing number of cyber threats combined with the increasing amount of data companies are storing today, the job of IT security has become complex, and some risky situations, like giving vendors access to your network, can get overlooked.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
Every day we’re presented with news of the “next big thing.” Disruptive technology developed by some of the most resourceful minds of our time has created tremendous value for companies. These revolutionary tools, which have completely changed the ways we work and play, are simply powerful. The problem is that power isn’t always a good thing. In 1771, British-Irish statesman Edmund Burke said, “The greater the power, the more dangerous the abuse.” While his subject at the time had more to do with politics than technology, the statement holds the same truth today as it did then.
If you knew that there was an increase in crime in your neighborhood, would you do something about it? Of course, you would. You would make sure that all the doors and windows to your house were locked. You might even beef up your defenses and purchase a security system just to get peace of mind that your family and property are safe.
We’re living in a time where cybercrime and ransomware attacks are announced like the next big box office hit. They’re making an impact worldwide, and it’s causing many businesses to suffer downtime, loss of business, and increased costs to recover from attacks. One of the most common types of scams affecting businesses is referred to as phishing. Phishing attacks are generally emails that entice users to perform an action, like clicking a link to an infected webpage, opening a malicious attachment, or even wiring money.
It’s not uncommon for your customers to give you specifications about how they want to do business with you. These specs increasingly include cyber security expectations, specifically compliance with the NIST(1) Cyber Security Framework. What should you do if someone with whom you do business places this requirement on you? Here’s what you need to know.
Think back to what your life was like 16 years ago. The year was 2003. Were you thinking about cyber security back then? Probably not, but that was when National Cyber Security Awareness Month (NCSAM) was started through a collaboration between the U.S. Department of Homeland Security and the National Cyber Security Alliance (NCSA). In 2019 cyber security is more important than ever and this year’s awareness theme focuses on personal accountability.
If you have your laptop, you can work from just about anywhere if there’s an internet connection to your company servers. Out on a sales call and need to log in to grab your proposal? Need to get to your email from home? Updating your project timelines while you’re waiting at the airport for your next flight? No problem! No problem unless…
Did you know that October is National Cybersecurity Awareness Month (NCSAM)? The Department of Homeland Security describes this nationwide initiative as "a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online.”
Email communication is a necessity in any organization, which also makes it a breeding ground for cyber attackers. All too often, we hear from executives about concerns that email will become an open door for a data breach or malicious software such as a virus. They ask us, “How can we tighten email security to avoid becoming a victim of these hackers?"