Business Technology and Security
Posts about:
cybersecurity awareness
SLAM that Phishing Email
You may know the SLAM technique as STOP LOOK ASSESS MANAGE. This is a good technique to use when you are faced with an unexpected email. We have another SLAM to help you identify phishing.
IS YOUR BUSINESS MITIGATING ITS TOP SECURITY RISK...
HUMANS?
We all have employees that have made mistakes at one time or another. Maybe they had an overwhelming schedule that caused them to slip up, or maybe they simply typed in an email address incorrectly and hit send. No matter what the cause, employees are human, they make mistakes, and they are being TARGETED.
T-Mobile Cellular Breach
Last week we saw the mobile phone carrier T-Mobile fall victim to cybercriminal activity when a hacker accessed the personal data of their users. They learned of the breach via claims that were made on an online forum. This led to an investigation and hiring of cybersecurity experts to help with the situation.
THE LEADER’S ROLE IN CREATING A CULTURE OF SECURITY AWARENESS
WHY SHOULD YOU BUILD A CULTURE OF SECURITY AWARENESS?
The risks to all businesses due to cybersecurity breaches are well-documented and they are growing. Most experts advise businesses to plan for a breach due to the likelihood of an occurrence. Your IT staff have likely also been asking for additional resources to help combat the very real threats of bad actors that want to steal your data. As an owner or executive at your company, what is your role in all of this?
Online Behavioral Tracking – The Good. The Bad. The Ugly.
We were was recently asked about the threat to privacy and businesses based on online behavioral tracking technology. While this has been around for many years, the sophistication of targeted advertising online has grown, yet, it is still not at a “Minority Report” level. The first step in understanding the threat is to understand the technology. Online behavioral tracking is a product of technologies built-in to web pages and web browsers that work silently in the background as you use the internet.
Managing Backups of Your Data
VICTOR IS A SYSTEMS ENGINEER AT THE AME GROUP, MANAGING BACKUPS FOR OUR CLIENTS AND OUR OWN! WE ASKED HIM, WHAT IS IMPORTANT TO KNOW ABOUT BACKUPS AND RECOVERY?
Backups are something everyone wishes they had when technology goes south. Like the insurance policy, you didn’t size right or bother to purchase.
Think Before You Click
National Cybersecurity Awareness Month
To reduce your risk of falling for a phishing scam, Think Before You Click!
WHAT TO DO WHEN YOUR CREDENTIALS ARE FOUND ON THE DARK WEB
Sites are hacked every day.
- There is an attack every 39 seconds (Security Magazine)
- Hackers steal 75 records every second (Breach Level Index)
- More than 23 million people use the password ‘123456’ (National Cyber Security Centre)
- Traditional firewall and antivirus security is irrelevant and obsolete (Thycotic.com)
- Hackers create 300,000 new pieces of malware daily (McAfee)
- On average 30,000 new websites are hacked every day (Forbes)
How to Cause a Data Breach in 10 Easy Steps!
STEP 1: Make sure to click on every link, and download every attachment sent to you via email. On mobile, feel free to trust links sent to you in random text messages.