Cybersecurity

/Cybersecurity

6 Lessons from This Summer’s Ransomware Attacks

By |2019-08-25T19:12:11-07:00August 28th, 2019 |Tags: , , , , , |

“I would’ve never dreamed this could’ve happened," Lake City mayor Stephen Witt told his local news station, "especially in a small town like this.” But that's exactly where it’s happening. Lake City is one of dozens of small towns across the country that have lately fallen victim to an onslaught [...]

Tips for Creating a Cybersecurity Training Program

By |2019-08-20T16:53:10-07:00August 21st, 2019 |Tags: , , , |

The threat of cyberattacks and other online crime is very real, and it’s getting worse. The first half of this year saw a massive increase in the number of ransomware and other cyberattacks against business, local governments, hospitals, and other industries. But studies show that the leading cause of actual [...]

Recovering from a Ransomware Attack (A Client’s Tale)

By |2019-08-14T12:36:03-07:00August 14th, 2019 |Tags: , , |

Recently we got a call to help a local metal fabrication company deal with a ransomware attack that brought their business to a screeching halt. Their story offers a lesson to any business still using old hardware and software, or not updating their online security. Online threats become more numerous [...]

Why Data Breaches Are Partly Our Own Fault

By |2019-08-06T22:55:04-07:00August 7th, 2019 |Tags: , , , , |

You hear a lot in the news about data breaches exposing tens or hundreds of thousands of records, costing companies millions of dollars. And yet, the sad truth is that nearly half of it is our own fault. According to a recent study, human errors and system glitches were responsible [...]

10 Ways to Improve Your Mobile Security Today

By |2019-04-23T08:09:34-07:00April 24th, 2019 |Tags: , , |

Less than a decade after the debut of the smartphone in 2007, more people used mobile devices than computers to access the internet for the first time. In the 12 years (yes, that’s all!) since the first iPhone landed in our hands, mobile computing has grown by leaps and bounds. It’s [...]

How to Create an IT Disaster Recovery Plan

By |2019-07-29T19:54:58-07:00March 13th, 2019 |Tags: , , , |

Malware, cyberattacks, and other online threats can destroy your business. In fact, about 60 percent of companies who experience a cyberattack are out of business within six months, simply because they never recover from the downtime and the staggering loss of data, money, and other assets a digital disaster can [...]

How to Respond to Ransomware and Malware Cyberattacks

By |2019-05-13T21:17:48-07:00February 20th, 2019 |Tags: , , |

Cybercrime is a big problem. And big business. And both are getting much bigger. “Cybercriminal activity is one of the biggest challenges that humanity will face in the next two decades,” predicts the research firm Cybersecurity Ventures. They estimate cybercrime damage will cost the world $6 trillion by 2021, double [...]

How to Spot (and Block) Email Phishing Scams

By |2019-05-13T21:18:03-07:00February 13th, 2019 |Tags: , , |

Cybercrime comes in many disguises, goes by many names. But the endgame is basically the same — to steal your money, either now or later. Ransomware is now. You’ve heard about it a lot since 2017. Your computer files are literally held for ransom. A cybercriminal uses malware to encrypt [...]

It’s Tax Time: How to Protect Yourself from Email Tax Scams

By |2019-03-12T10:03:47-07:00February 6th, 2019 |Tags: , |

It’s tax season. And it’s not just the IRS after your money. Tax time is a special time for cybercriminals. People are on edge, eager for their refund or dreading their bill. Perfect prey. You’ve seen those fake IRS emails. You’re threatened with jail, fines, and a miserable life if [...]

Secure your Business from Threats!

By |2019-03-13T15:44:28-07:00October 25th, 2018 |

Secure your Business from Threats!  43% of cyber-attacks target small/medium businesses and within 60% of these companies go out of business within six months of a cyber attack. Whether you are a small or medium company, keeping your network secure and up to date is crucial to keep it running. The [...]