If you’re a small to medium-sized business (SMB), you may be at higher risk of experiencing a hacker attack, malware phishing, or other serious IT security threat than you think. Unfortunately, most SMBs (falsely) believe that only large enterprises are targeted by cyber attackers. While it’s true that there have been some mega breaches in enterprise security in recent years, SMBs are still squarely in the sights of malicious hackers. In 2016, The Denver Post reported that small and mid-sized businesses are hit by 62% of all cyber-attacks, about 4,000 per day, according to IBM. But these businesses don’t just get attacked, hire IT specialists to fix the problem, and then go back to business. The effects of a single cyber … [Read more...] about These IT Security Threats Can Damage Your Business: Learn How to Protect Yourself
risk mitigation
12 Cloud Security Questions You Need to Ask Your Cloud Providers
Worried that cloud computing puts your business’ critical data at higher risk? You’re not alone. British Telecommunications (BT) conducted a study to understand the attitudes of large organizations regarding cloud computing and security. They found that 52% of U.S. survey respondents and 49% of global respondents were “very or extremely anxious” about the security implications of cloud-based services. What’s puzzling is that this same study revealed that 79% of U.S. businesses and 70% of global businesses are using cloud storage and web-based applications. You might find yourself in a similar situation - taking advantage of some of the benefits cloud technology provides (like disaster recovery) while still being nervous about … [Read more...] about 12 Cloud Security Questions You Need to Ask Your Cloud Providers
The Why and How of Disaster Recovery Plans
Picture this: you sit down at your desk with a fresh cup of coffee, enjoying the sound of heavy rain hitting the window, ready to put the final touches on your next big proposal. You go to print the document when suddenly your computer shuts down. The lights turn off. You hear the rest of your team loudly complaining outside of your office. A wide-area power outage has struck and you’re left scrambling to figure out what to do next. Remember that disaster recovery plan you created years ago and never tested, never updated, and haven’t thought about since? Oh, that’s right, yours is one of the 2 out of 5 of companies who never commit their plan to paper. In fact, you might even be 1 out of the 5 companies that never test their … [Read more...] about The Why and How of Disaster Recovery Plans
How to Prevent Man in The Middle Attacks
Sharing confidential information and data is an essential part of modern business - quickly and easily sending emails, accessing online business applications, and retrieving data from internal databases all enable maximum productivity and competitive advantage. However, relying on these data transmissions across internal networks and the internet presents an opportunity for hackers to intercept that traffic and access your sensitive business information. These traffic interceptions are known as man in the middle or MiTM attacks. Let’s explore what these attacks are, some key vulnerabilities, and steps you can take to prevent man in the middle attacks. What is a Man in the Middle Attack? A man in the middle (MiTM) attack is just … [Read more...] about How to Prevent Man in The Middle Attacks



