Is Your Current IT Company Living Up To Their Social Responsibility?
As a business owner, it’s up to you to make sure that the information and data collected by your company are secure and protected against the many different types of cyber threats lurking within the dark web. Many people believe it is the responsibility of their IT company to handle this type of situation. While […]
Important FBI/DHS Warning: Update On FBI and DHS Warning: SamSam Ransomware
The Department of Homeland Security and the Federal Bureau of Investigation issued a critical alert Dec. 3, warning users about SamSam ransomware and providing details on what system vulnerabilities permit the pernicious product to be deployed. According to the alert, which came from the DHS’s National Cybersecurity and Communications Integration Center (NCCIC) along with the FBI, […]
How Can You Stay Safe From Phishing Attempts? Try These 7 Tips
In this article, we’ll be going over the top seven ways to protect yourself and your business from email phishing attempts. But first, what is phishing? Phishing Defined Although it may sound like a recreational sport, phishing is not a virtuous practice. It is, instead, the deceitful and illegal practice of trying to obtain personal information […]
FTC Issues Warning After Marriott Data Breach
In late 2018, the Federal Trade Commission (FTC) issued a stark warning about a massive data breach at a Marriott chain that exposed the records of 500 million people. The latest major corporate breach reinforces the need for companies to invest in multilayered security protocols that protect networks, devices and users. What Happened at Marriott? […]
Threat Advisory: SamSam Ransomware
SamSam Ransomware is becoming a massive problem for multiple industries across the United States. In fact, the problem is so big that The Department of Homeland Security, (DHS), National Cybersecurity and Communications Integration Center, (NCCIC), and the Federal Bureau of Investigation, (FBI), have all recently issued a US-CERT alert due to the SamSam ransomware. Like other types […]
The Guide To Increasing Labor Efficiencies With Managed IT Services
Efficiency is one of the most challenging objectives for most companies to achieve. To be efficient, a firm needs to focus on optimizing limited resources to achieve the best results possible at the lowest cost. As you probably know from experience, this is far easier said than done. To boost efficiency, a company needs to […]
DHS/FBI Issue Critical Alert: SamSam Ransomware
The FBI and Department of Homeland Security (DHS) have issued a vital ransomware alert for the SamSam ransomware also known as MSIL/Samas.A. The FBI and DHS alert, issued on November 3rd, 2018 describes how hackers armed with SamSam ransomware have targeted multiple industries, including some within critical infrastructure. Those victimized by SamSam have been located predominately […]
Marriott Data Breach: What You Need To Know
Heads up if you’ve stayed or made reservations at a Marriott or Starwood property over the last decade. A major security issue was just announced and the scope of the problem is actually quite astonishing. Here’s what you need to know about the Marriott International data breach. What is the Marriott Data Breach? On November […]
Marriott 500 Million Person Data Breach (Questions/Answers)
How Marriott Got Caught In A 500-Million Person Data Breach Were You Affected? (Your Questions Answered) What Do We Need To Know About The Marriott Breach? Another big corporation got hooked. This time it was Marriott International. They just revealed that their Starwood reservations database of 500 million customers was hacked and that the personal […]
Microsoft Office 365, Data Governance Made Painless
Companies that manage data governance well are in a better position to meet data protection and retention compliance requirements and to accomplish their digital transformation goals. Microsoft Office 365 makes comprehensive, streamlined data governance throughout your organization easy, with automation tools for setting policies governing data retention, expiration, and deletion. The majority of companies already […]