Tag Archives: data security

Computer Hackers 101

Most people are aware of terms like phishing and malware, but do you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud, in fact it’s been used for many years to manipulate a wide range of people into giving up important data about themselves or workplace. A prime example of social engineering goes back to Greek mythology with the Trojan horse. They infiltrated the city of Troy with a “peace offering” filled with soldiers, thus winning the war. With technology at the forefront of our lives, social engineering has entered a new era. Physical human interaction is not necessarily required anymore. Cyber-criminals, better known as computer hackers, can gain information through emails, pop-ups andRead Full Article


Mischievous Malware

Unfortunately, malware is not a foreign term, in fact it’s pretty well known to anyone who uses a computer. There are several types of malware, as well as mediums in which you may receive it. So, before you click on that link for the free cruise you won, think about all of the personal data you could be giving away. First, let’s take a quick tour of the types of malware you may run into. Viruses: These act very similar to the flu virus. Once it gets into a computer, it propagates by copying itself and becoming part of another program. Then just like the flu at an elementary school, it spreads from computer to computer. However, a virus must be activated, by opening orRead Full Article


Phishing 101

Phishing 101 While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% in the last year. What exactly is phishing? Hackers mimic the emails, forms, and websites of legitimate companies in an effort to lure people into providing their private, personal information, like credit cards numbers, social security information, account logins, and personal identifiers. The victim typically doesn’t realize they’ve been compromised until long after the event, and oftentimes only after their identify or finances are affected. In the past, an attack was carried out relatively quickly.Read Full Article


Data Security and Government Regulations

  Any business that stores customer payment information must comply with a number of state and federal regulations. The legal, healthcare, and financial sectors have a number of laws tailored specifically for them (such as HIPAA or CISPA). If you run almost any kind of professional practice or agency you probably have very specific data security requirements. Running afoul of these regulations puts you at risk for legal action and probably means that you have bad security in place. As a professional, your focus needs to be on your clients and running your firm. Regulatory requirements to ensure data security can be complex and include rigorous testing requirements. Ensuring compliance with the regulations can be a serious distraction for you and take you into territoryRead Full Article


Creating a Strong Password

How strong is your password? Did you know that having a weak password is one of the biggest security risks you face? This blog focuses on the best practices related that you can follow to ensure passwords are not your weakest link. A recent article states that 81% of data breaches are caused by poor passwords! Avoid sequences and repetitions: How many times have you used passwords like dollar12345 or $$$BobMckinley. Passwords containing sequences and repetitions are just easier to hack. Avoid using your personal data: Do not make your birth date, bank account number, or address a part of your password. It puts your data at stake if your personal information is stolen. Don’t repeat passwords: Make sure you pick unique passwords every time.Read Full Article


Data Loss Can Cause Your Law Firm to Shut Down

Small and medium sized businesses (MSPs), including law firms, rely more than ever on IT systems to efficiently run their business, support customers, and optimize productivity. These systems house sensitive digital data ranging from employee and customer information, to internal emails, documents, financial records, sales orders, and transaction histories. This is in addition to applications and programs critical to daily business functions and customer service. Preventing data loss is therefore an incredibly important function that your tech firm must be able to provide. While corporate-level data losses and insider theft, when they happen to Fortune 500 companies, are well publicized, many smaller businesses have also become casualties of data loss and theft. Following a significant data loss, it is estimated that a small-to-medium sized businessRead Full Article


Two-Factor Authentication: Security for Your Valuable Data

Two-factor authentication is an extra step that one takes when logging in to various sites and programs. It happens after the username and password have been entered. I know what you’re thinking, passwords are difficult enough. However, many times. in order to make it convenient to remember, we use the same password for nearly all websites (which I would never recommend) or we make simple passwords that are easily guessed, i.e. password, password 123. What two-factor authentication does is add an extra layer of security on top of those passwords, no matter how simple or complex they are, in order to further protect your information online. A quick and easy way to describe two-factor authentication is to think of when you call your bank’s customerRead Full Article