Today is Cyber Monday, and that means that billions of transactions will occur on line. That also means, as TransUnion puts it, "what's convenient for shoppers can also be a huge opportunity for savvy identity thieves, who steal information provided on Internet transactions for their own monetary gain."
Read MoreTechnology Advisor Blog
WPA2 Wireless Security Vulnerability - What You Need to Know
Posted by Ann Westerheim on 10/17/17 8:47 AM
A new wireless security vulnerability related to WPA2 encryption puts almost every WIFI device at risk for hijacking and eavesdropping. This was the major headline yesterday and we've been busy updating security on our managed clients.
Read MoreTags: Wireless Network, cybersecurity, WPA2
Beware of Phishing attempt to "Authenticate your Account"
Posted by Ann Westerheim on 7/25/17 9:12 AM
Stay alert when reading through your email. Our Cybersecurity advice focuses on "layers" of security, and even with all the technology in place to protect you, the "bad actors" will always resort to new tricks. End user education and vigilance are key.
Read MoreTags: phishing, email security, cybersecurity
Employee Training - Protect Your Company From Ransomware
Posted by Ann Westerheim on 5/18/17 8:08 AM
As I am sure you have heard, this past weekend we experienced perhaps the most extensive cyber-attack yet seen, as computer networks globally, in over 100 countries including the US, were infected by the WannaCry Ransomware. Hopefully, your company was able to avoid this infection, but don’t relax - additional waves of WannaCry are expected, followed by increasingly more sophisticated ransomware variants. Ransomware has not only become an increasingly profitable activity, but provides a warped sense of technical accomplishment for the cybercriminals who successfully perpetrate it. WannaCry is just the beginning, and ransomware infections will continue, becoming increasingly more dangerous and difficult to stop, at the extreme threatening the very survival of your business. You must now take the steps to protect your business.
Read MoreTags: training, cybersecurity