Backup Data Offsite to Thwart Cyber Criminals

Backup Data

Time and time again, managed service providers have stressed the importance of completing regular data backups, even for very small businesses. As even these small businesses have come to rely on their data more and more, most companies do understand why backing up their data is a very smart move on their part. Unfortunately cyber criminals are always on the lookout for additional targets and they do seem to target

Early Preparation for the 2019 Hurricane

Early Preparation

It is a great idea that everyone has a good plan in place for the upcoming 2019 hurricane to protect their IT systems. We understand the massive damages that hurricanes can do when it gets us unprepared. Below are some steps you can follow in preparation for a hurricane: Property check – Ensure your property is well protected from water damages as it is the main thing that affects IT 

Six Steps of a Cyber Security Assessment

Cyber Security

Cyber security risk assessment is an essential element of any information security program.  As the technology landscape continues to evolve, your company needs to take appropriate steps to make sure your data isn’t vulnerable to potential threats.  A great resource for conducting risk assessments is the U.S. Department of Commerce National Institute of Standards and Technology Guide for Conducting Risk Assessments, often referred to by its publication number, NIST 800-30.

Building a Solid Cyber Security Foundation – 6 Essential IT Security Services

6 Essential IT Security Services

As with any well-built system, effective cyber security begins with building a solid security foundation. Without thoughtful attention to building a good foundation, a business will remain vulnerable to hacks and breaches until they finally decide to face cyber security issues head on. Assessment When first addressing an issue, one must first assess all the security issues, both the obvious and the potential ones. Assessing a company’s technology vulnerabilities must

The Newest Extortion Scams Are Using Your Own Passwords as Bait

Using Your Passwords

As internet scams become more and more sophisticated extortion scammers have found another new piece of bait by which to hook internet users and that is with their old passwords. These extortion schemes often claim that someone has the person’s compromising information and that they are happy to help get that information back if the person is willing to pay them to do so. Fearing that their information is going