Six Steps of a Cyber Security Assessment

Cyber Security

Cyber security risk assessment is an essential element of any information security program.  As the technology landscape continues to evolve, your company needs to take appropriate steps to make sure your data isn’t vulnerable to potential threats.  A great resource for conducting risk assessments is the U.S. Department of Commerce National Institute of Standards and Technology Guide for Conducting Risk Assessments, often referred to by its publication number, NIST 800-30.

Building a Solid Cyber Security Foundation – 6 Essential IT Security Services

6 Essential IT Security Services

As with any well-built system, effective cyber security begins with building a solid security foundation. Without thoughtful attention to building a good foundation, a business will remain vulnerable to hacks and breaches until they finally decide to face cyber security issues head on. Assessment When first addressing an issue, one must first assess all the security issues, both the obvious and the potential ones. Assessing a company’s technology vulnerabilities must

The Newest Extortion Scams Are Using Your Own Passwords as Bait

Using Your Passwords

As internet scams become more and more sophisticated extortion scammers have found another new piece of bait by which to hook internet users and that is with their old passwords. These extortion schemes often claim that someone has the person’s compromising information and that they are happy to help get that information back if the person is willing to pay them to do so. Fearing that their information is going

The Marriott Breach – We Now Know Everything

Marriott Breach Affects Millions

Consumers and many employers suffered a significant blow with the massive data breach recently revealed by Marriott International Hotels. Their hacked data included personal information from nearly half a billion guests. Marriott’s reservation system for their Starwood line of hotels exposed personal data including guest names, passport numbers, phone numbers, email and mailing addresses, along with some credit card information which included the encryption software that could decode the stolen

Managed IT Support Can Reduce the Risk of Cyber Theft from Miami Businesses

Reduce the Risk of Cybertheft

Network security breaches have been in the news lately. Hackers have targeted such large organizations as the federal government’s Office of Personnel Management and the Bank of Bangladesh. While security breaches at large institutions make the news, cyber theft from small businesses quietly takes place in the background. Many of Miami’s small businesses handle more money through their computers and networks than through their cash registers. Credit card credentials, ACH transactions and emailed