Can You Survive a Network Security Attack

Businesses are under constant attack from a variety of network security threats.  Cybercriminals hack databases for passwords for unauthorized access to your network.  Undetected Malicious software (malware) can trap and forward passwords. Viruses can infect your hard drive and destroy application data and files without your knowledge. Businesses large and small face these network security threats on a daily basis; larger organizations, however, may have more resources to fight attacks.  Small businesses may be more vulnerable to downtime and loss of productivity because of thinner margins and resources. Here are a few steps you can take to survive a network security attack. Prevent Network Security Attacks Before they Occur Protect your network by making sure all devices are in compliance with the latest anti-virus and malware updates. Ensure your operating system (O/S) patches are up to date. Protect your network with strong passwords and require your employees to change them regularly.  Discourage writing passwords down, and make sure employees are aware of the risks of a network security attack. Lock Down your Mobile Devices Mobile devices including smartphones and tablets are particularly vulnerable to theft and loss. Passwords on these devices can be easily cracked leaving your applications and data vulnerable to unauthorized access. Train your employees to report theft or loss of mobile devices quickly, and make sure that all data on the device is encrypted.  Having the ability to track and wipe data from these devices is another option to ensure you can survive a network security threat. Backup Your Data Online Backup and Cloud Backup are affordable options to have quick access to applications and data...

Target Privacy Data Breach: Part 2

Target Retailers were just involved in the second largest credit card data breach in United States history. Today Target announced the data breach that occurred over Thanksgiving weekend now exposes upwards of 70 million credit and debit cards. Target also disclosed the privacy data breach compromised names, addresses, phone numbers or email addresses, in addition to credit card information.  When businesses are victims of a security breach, loss of revenue is often highlighted in the news. What the media often overlooks is the internal costs of remediation, exposure to privacy breach laws and loss of reputation with their customers. Any Business can be the Target of a Privacy Data Breach While large companies make the news, many small business owners believe their company is too small to be targeted by cyber criminals resulting in privacy data breach.  According to Verizon Wireless’s 2012 Data Breach Investigation Study, 71% of data breaches occur in companies with fewer than 100 employees.  A privacy data breach can be devastating to a small business. Malware or software used to interrupt a computer’s processing, is a common way of perpetrating these attacks.  Small businesses are often unprepared when it comes to these attacks. What a Business Owner do to Avoid a Privacy Breach Action can be taken to protect your small business and your customer’s sensitive information.  First, audit your network regularly. Periodically scan your network for unauthorized computers and devices connected to your network directly or via Wi-Fi.  Also, update any antivirus or malware software regularly. Check your firewall and security settings.  Make sure all your defense mechanisms are up to date and working...

Cyber Attack Target

Target Retailers were just involved in the second largest credit card breach in United States history. A cyber security attack occurred over Thanksgiving weekend, which exposed upwards of 40 million credit and debit cards users. Compromised information included credit and debit card information, as well as customer names. When large businesses are victims of a security breach, it often is highlighted in the news. What the media fails to recognize, is the susceptibility of small businesses to cyber attacks. Small Business are Susceptible to Cyber Attacks Many small business owners believe their company is too small to be targeted by cyber crime. According to Verizon Wireless’s 2012 Data Breach Investigation Study, 71% of data breaches occur in companies with fewer than 100 employees. An information breach can be devastating to a small business. Malware, or software used to interrupt a computer’s processing, is the most common way of perpetrating these attacks. Small businesses are often unprepared when it comes to these sorts of attacks. Protecting Data from Cyber Attacks Action should be taken to protect your small business and your customer’s sensitive information. First, audit your network regularly. Periodically scan your network for unauthorized computers and devices connected to your network directly or via Wi-Fi. Also, update any antivirus or malware software regularly. Also check your firewall and security settings. Make sure all your defense mechanisms are up to date and working properly.  It is also important that all employee are trained on your policies and procedures for avoiding malware and identifying phishing schemes. It is important to keep a secure network to ensure your customers trust. By keeping...

Why Small Businesses Need Technology

Technology has become an integral part of most small businesses.  Email has replaced the fax machine.  An onslaught of mobile devices have replaced cash registers, binders and note pads.  Pencil and paper no longer keep up with the velocity of business today.  In order to attract new customers and deliver products and services at competitive prices, small business technology is the cornerstone to automation and profitability. Cloud computing, mobility and consumerization of IT make it affordable for small businesses to deploy systems that were once reserved for large scale enterprise.  With ready access to small businesses technology, there is also more reliance on these core systems.  Small businesses are also targets of cyber attack because they may be perceived as more vulnerable and less vigilant.  Also, small businesses may be less resilient to business disruption related to systems failure.  Accordingly, Small Businesses should take every precaution to protect applications and their data.  They should also properly assess their risks and exposure to ensure they get the most from their small business IT Budgets. What can small businesses do to make sure these systems support the ongoing operations with minimal interruption? Small Business Technology Inventory A good place to start is to take inventory of your systems and data.  It is good policy to document all of your IT assets including hardware, networking devices, application software and data so you can have a complete view of your IT Systems.  Make sure you include mobile devices, cloud computing or software as a service (SaaS) systems, as well as, custom applications and legacy systems. Small Business Technology Risk Assessment Once you have...

Getting More From Your IT in 2013

Getting More From Your IT in 2013 There are plenty of ways to get more from your IT budget in 2013. Mobility, remote support and cloud backup are a few technologies that will make your budget go farther. Let’s explore a few ways you can leverage these emerging trends to get more from your IT infrastructure. Mobility Mobility is a rapidly growing trend. Most analysts agree there will be as many shipments for mobile devices (e.g. smart phones and tablets) as there are for PC desktops, laptops and servers shipped in 2013. With more emphasis on mobility, companies need to address the security issues around lost or stolen devices. Mobile devices may have access to critical business applications or have corporate data resided on the smartphone or tablet. Companies may be subject to data leaks if these mobile assets are lost or stolen. If you have unintended disclosure of privacy information related to employees, customers or suppliers, you may be subject to fines due to breach of industry (e.g. PCI Compliance) or regulatory requirements (e.g. HIPPA). You may also lose goodwill with customers if you suffer a data loss. A data loss could also impact sales. By protecting these mobile devices with a proper mobility strategy, you can avoid the costs associated with a data leak. As they say, “an ounce of prevention is worth a pound of cure”. Remote Support Many companies have turned to remote support models to monitor and manage their network environment. By remotely monitoring and managing your network and related IT assets, your IT Service Provider may be able to fix your IT costs...
Skip to content