Cyber Attack Target

Target Retailers were just involved in the second largest credit card breach in United States history. A cyber security attack occurred over Thanksgiving weekend, which exposed upwards of 40 million credit and debit cards users. Compromised information included credit and debit card information, as well as customer names. When large businesses are victims of a security breach, it often is highlighted in the news. What the media fails to recognize, is the susceptibility of small businesses to cyber attacks. Small Business are Susceptible to Cyber Attacks Many small business owners believe their company is too small to be targeted by cyber crime. According to Verizon Wireless’s 2012 Data Breach Investigation Study, 71% of data breaches occur in companies with fewer than 100 employees. An information breach can be devastating to a small business. Malware, or software used to interrupt a computer’s processing, is the most common way of perpetrating these attacks. Small businesses are often unprepared when it comes to these sorts of attacks. Protecting Data from Cyber Attacks Action should be taken to protect your small business and your customer’s sensitive information. First, audit your network regularly. Periodically scan your network for unauthorized computers and devices connected to your network directly or via Wi-Fi. Also, update any antivirus or malware software regularly. Also check your firewall and security settings. Make sure all your defense mechanisms are up to date and working properly.  It is also important that all employee are trained on your policies and procedures for avoiding malware and identifying phishing schemes. It is important to keep a secure network to ensure your customers trust. By keeping...

2013 Technology in Review

As always, a lot has changed in the Technology world in the past year. Systems are updating, while new technologies are becoming more prevalent. Windows XP, the operating system that 33 percent of personal computers rely on, is on the way out. Windows 8.1 has become the standard. Also, personal computers are leaving the scene. Small businesses are moving to the compact and portable Tablet. Business On the Go has never been easier. During the past year most companies adopted cloud computing.  While many advances have been made in these technological areas, Cyber security threats and related losses are reportedly on the rise. Why You Should Care About Windows 8 Now that Windows 8 is on the market, it is important to consider the switch. Although it is difficult to change from Windows XP or Vista to 8, having the latest operating system is an important security issue. One option is to do a Clean Install of Windows 8. The other option is to replace XP machines with Windows 8 for potential tax incentives. Mobile Computing Hits Main Street Technology companies continue to release a wide array of Touch Devices and there popularity continues to increase. 2014 will be the first year that tablet sales surpass personal computer sales. This shift to touch devices in the workplace will lead to increased mobility, functionality, and profitability in the work place. Cloud Computing Adoption on the Rise A research report by the Computing Technology Industry Association (CompTIA) 90 % of companies surveyed adopted cloud architectures as part of the IT infrastructure during 2013. In some cases, Cloud Computing deployments occur without...

Cyber Security Awareness

Did you know October is Cyber Security Awareness month?  This tradition was established ten years ago in the United States by the Department of Homeland Security in cooperation with the National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center.  This is a great opportunity for the public and private sectors to establish  secure and vigilant infrastructure and to protect IT Assets from Cyber Security Threats. This initiative places emphasis on the following areas of Cyber Security throughout the month: Mobile Security The importance of cyber security in a mobile setting is highly important, no matter where you are or what device you are using.  Business owners should take time to evaluate Mobile Security Policies including Bring Your Own Device (BYOD), Acceptable Use Policies for access to corporate systems and their data from a mobile device.  Mobile data protection including Antivirus, Anti Malware and Mobile Device Management to track, monitor, protect and enforce IT security policy on a Mobile Device. Cyber Security Workforce Cyber Security in the workforce highlights the importance of fostering the next generation of workers through education and training.  Cyber attack can come from anywhere in the world, at any time.  As a result, the Cybersecurity workforce is on the defense against elusive Cyber Criminals.  Having a well staffed, well trained Cybersecurity workforce is critical to the fight against Cyber Crime. Cyber Crime Cyber Crime prevention focuses on national and local efforts to prevent traditional crimes like theft, fraud, and abuse that can also take place online.  Many of these attacks go unnoticed and unreported.  Malicious software or Malware may be downloaded and undetected.  Phishing schemes...

What is Malware and Why Should I Care?

Malicious Software or Malware is a serious concern to IT Security experts and business owners alike.  Malware is a category of Cyber Security threats that includes Viruses, Worms,Trojans and Botnets.  It is no surprise that the Computing Technology Industry Association (CompTIA) tenth annual IT Security Information Trends report placed Malware at the top of the list of security threats.  CompTIA cited that eighty-five percent of Business Owners and IT Professionals have a moderate to serious concern about Malware.  Why should you care? Many times Malware intrusions will go undetected. Some malware may cause your computer to run slowly.  Some malware may be programmed to silently harvest privacy data from your hard drive, while other malware is programmed to destroy data on your hardware.  Other malware can turn your PC into a Cyber Hacker by exploiting security holes and using your PC to attack other PCs. Costs associated with data breaches is estimated to be as high as a billion dollars each year.  Moreover, the number of Malware threats are exploding.  Symantec estimates there will be over 250,000 new threats (not attacks) identified on Android devices in 2012 alone.  What can you do to avoid Malware? IT Security Risk Assessment The reality is you can not afford to eradicate one hundred percent of all cyber threats, so you need to have a pragmatic plan for defending yourself.  Start by understanding your security risks by reviewing your core applications and data, policies and procedures, as well as, your network infrastructure.  You are as vulnerable as your weakest link. IT Security Compliance To protect your applications and their data, as well as...

Are You Ready for Mobility?

Mobility in the workforce is increasing productivity and driving savings for small to medium sized companies. Recent research from the Computer Technology Industry Association (CompTIA) uncovers 73% of small businesses surveyed cite they have a mobile device strategy driven by moderate to heavy focus for Mobility to make employees in the field more productive. Moreover, 58% of respondents have productivity gains for travelling employees as a moderate to heavy focus to include smart phones, tablet PCs and laptop computers in their businesses. Connecting employees with customers was cited as a moderate to heavy focus for driving Mobility strategies by 55% of those surveyed, while 48% cited eCommerce as a moderate to heavy focus in their Mobility strategies. To take full advantage of smart phones, tablet PCs and laptop computers in your company, there are a few precautions to consider when rolling out a mobile solution. Here are a few tips to consider to get the most from your Mobility solution: Check your Mobile Security Policy Some mobile devices may be vulnerable to trojans, malware and phishing schemes. Ensure that your Mobile Solution includes security measures to keep devices connected to your network, corporate applications and data are up to date with mobile anti-virus and mobile-anti malware protection. Passwords aren’t enough to protect your devices, therefore, companies must also encrypt corporate data on mobile devices and be prepared to remotely locate and wipe lost or stolen mobile devices. Check your Network Bandwidth for your Mobility Solution Some mobile applications can put a strain on your companies wireless network. To receive maximum productivity from your employees using mobile devices in the...
Skip to content