How do you guard against employee theft of data without creating an environment of suspicion? By developing and administering an internal security policy, you can keep internal security at a professional level. Here are a few highlights in beginning to consider a plan: Understanding Your Data Monitoring Network Activity Utilizing Data Protection Tools for Various […]
10 Ways to Improve Network Security
The New York Times reported recently on a Computer Security Institute survey of 443 companies and government agencies. They found that 64 percent reported malware infections and the “financial loss from security breaches was $234,000 on average for each organization.” Here are ten ways to improve network security based on the New York Times article. […]
Extending Your Data Center into the Cloud
Computerworld ran a thoughtful article about several organizations that have moved some and/or most of their applications into the cloud.[1] These groups have enjoyed tremendous savings, reduced internal workloads, and enjoyed faster deployments. As any company considers expanding to the web, it is important to process the opportunities and challenges associated with such a move. […]
Underestimating the Consequences of a Data Breach
According to a report from the Ponemon Institute, many small to medium businesses (SMBs) fail to prepare for data breach.[1] In the “State of SMB Cyber Security Readiness: US Study,” Ponemon reports that organizations that had suffered a breach had different expectations from organizations that had not suffered a breach. As a result, many SMBs […]
Cyber Attackers Gain Ground Every Day
In the last few years, government and business cybersecurity experts continue doing better and better, while attackers also continue to do better and better. Steven Chabinsky, former chief of the FBI’s Cyber Intelligence Section, challenges the business and government sectors to adapt, adjust, rethink their approach to cybersecurity or slide backwards. Dennis Fisher over at […]
Towards a Healthcare BI Plan
Healthcare business intelligence can potentially improve patient care and reduce costs when used effectively within a given facility. At the same time, using BI within a healthcare environment comes with a range of challenges due to the critical nature of the environment, the massive amount of complex data that needs accurate interpretation, and the caution […]
Planning for Disasters
How prepared is your business for a hurricane, flooding, power outages, a tornado? According to The Institute for Business & Home Safety an estimated 25% of business never reopen after a major disaster. Those who do reopen may still face such surmounting obstacles that they end up closing. 75% of the companies who fail to […]
Ransomware: What You Need to Know (Part 1)
What is Ransomware? Ransomware is malware that enables cyber extortion for financial gain. Criminals can hide links to ransomware in seemingly normal emails or web pages. Once ransomware infects a user’s system, it either encrypts critical files or locks a user out of their computer. It then displays a ransom message that demands virtual currency […]
Ransomware: What You Need to Know (Part 2)
How does it spread? Ransomware has been shown to spread in four different ways: As an email sent to company addresses pretending to be from customer support from FedEx, UPS, DHL, Outback Steakhouse, etc. The trojan is attached to the email, usually labeled as a tracking number In PDF documents that are attached to emails, […]
Ransomware: What You Need to Know (Part 3)
Best Practices to Combat Ransomware Take a layered approach to security A firewall and Antivirus combination are not enough to secure an environment against ransomware. Layers of protection are an important and in-depth part of your defense. Manage network traffic Proper management of network traffic leads to better control of what traffic is on the […]