The IT Services & Cyber Security Education Center
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
Company password policies may not be exciting (and you likely find yourself frustrated with them at times) but they’re an important piece to keeping company data out of the wrong hands. It seems like a simple step, yet strong password policies and best practices are a huge issue, specifically in the small to mid-size business (SMB) market. Verizon’s 2020 Data Breach Investigations Report found that 80% of breaches from hacking involved lost, stolen, or weak passwords.
If you’ve been following the news, you may have heard about the recently discovered Log4j vulnerability but you may not be clear on what it is and how it could affect your business. We’re here to help. The details are still unfolding, but here’s what we know now.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
In a previous blog article, Marty Kaufman recounts the story of meeting with a business owner who was panicked and in crisis mode because of a cyber attack. If we could backtrack to the days, weeks, and months before the attack, we’d find that the business owner didn’t pay much attention to cyber security because he thought the odds of a data breach happening to him were low. As it turned out, the odds were higher than he thought, and it did happen.
Hackers are getting more sophisticated. As a result, the minimum security protections that businesses need to defend against cyber criminals have changed. Cyber criminals have advanced the technology they use to sneak in (or bust through) network doors, so the list of must-have cyber security basics has expanded. To have a fighting chance, you need a layered cyber security strategy. It might be hard to know what those layers should be if you’re not a technology specialist. You might even have a gut feeling that what you’re doing right now isn’t enough. So we’re here to help.
If crime increased in your neighborhood, would you do something about it? Of course, you would. You’d make sure that all the doors and windows to your house were locked. You might even beef up your defenses and purchase a security system just to get the peace of mind that your family and property are safe. The risk of a cyber attack in the internet neighborhood where you do business is increasing. Still, unfortunately, many organizations aren’t successful at locking the doors and windows to their data and systems.
As a business leader, cyber liability insurance is something you've likely heard of, but you may not know exactly what it is and if your business needs it.
WiFi-enabled devices are now a part of our everyday lives. Think about it, what isn’t WiFi-enabled in your life? From our cars to our coffee pots, the Internet of Things (IoT) has taken over the world.
If you’ve been wondering if you should outsource security, the best way to determine a course of action is to get a cyber security assessment. The report that you get about your cyber security stature will point you in one of three directions.
Far too often, small and medium-sized businesses tend to think that they’re not on a hacker’s radar or that a firewall and antivirus will keep them 100% protected against a breach. But that’s not the case. Cyber criminals steal whatever data they can and often use the compromised network to launch further attacks after penetrating your system or for extortion to sell your data back to you (or the highest bidder). That makes a business of ANY size a prime target.
If you're thinking about getting a cyber security assessment, it's likely because you have questions. You may be wondering: Do we have vulnerabilities that open us up to a cyber attack? Are we using the right technology for security? Does my IT team have the cyber security expertise that we need? Is IT handling everything that needs to be done?