Business Technology and Security

Posts about:

cyber security (2)

Who is guarding the gatekeepers?

This is a timeless concept from roman times, passed down in popular culture, and can be applied to your business security plan. Companies of even modest size and complexity rely on some form of IT to support their computer systems and data. Although, most companies trust their IT department or Managed Services Provider to include security as a baseline component of their work, how do you verify your IT security is dong what you THINK it is doing? A Vulnerability Assessment is a valuable tool.

Read More

WHAT TO DO WHEN YOUR CREDENTIALS ARE FOUND ON THE DARK WEB

Sites are hacked every day.

  •   There is an attack every 39 seconds (Security Magazine)
  • Hackers steal 75 records every second (Breach Level Index)
  • More than 23 million people use the password ‘123456’ (National Cyber Security Centre)
  • Traditional firewall and antivirus security is irrelevant and obsolete (Thycotic.com)
  • Hackers create 300,000 new pieces of malware daily (McAfee)
  • On average 30,000 new websites are hacked every day (Forbes)
Read More

CMMC: You Might Not Realize the Impact on Your Business

Cybersecurity Maturity Model Certification (CMMC)

The CMMC started within the Department of Defense (DoD) to reduce the theft of military intelligence, but as expected, it doesn’t look like it will be long before it spreads to other sectors. There’s interest in amending Sarbanes-Oxley to include CMMC, which will impact the financial sector.  Don’t fear this is just an additional burden – the CMMC model is set up to be clearer and easier to implement.  Standardization in security compliance is a win for businesses trying to juggle multiple requirements.

Read More

Working From Home Security Risks and Tips

We are all impacted by COVID-19 and businesses are responding by keeping their “doors open” virtually by moving to online sales and using a remote workforce.
Our Chief Information Security Officer, Joe Danaher, has some great tips to make sure your remote workers keep your business safe from cyberattacks.  Joe has spent his IT career navigating HIPAA security compliance and in the past 6-7 years, as the threats from hackers have evolved, staying 1 step ahead.

 

What is a VPN and how do companies use them for remote workers?

VPN stands for Virtual Private Network and is the safest remote connection.  It creates an encrypted tunnel between your remote device and the servers and files at work.  Windows 10 and Mac OSX have built-in VPN setup capabilities, however, you need a VPN service based on your type of business servers.  This is a nice step-by-step article recently published by CNET regarding how-to for Windows:  https://www.cnet.com/how-to/how-to-setup-a-vpn-on-windows-10/

Joe Danaher, CISO

Read More