Security

Cybersecurity Best Practices: Protecting Client Information

Cybersecurity breaches are on the rise. From small businesses to giant corporations, everyone is vulnerable to cyber attack. You don’t want to believe it but the unfortunate truth is: it could happen to you. Being aware of this is a good start. But if you’re faced with the reality of a cyber attack, you and…

Read More

Growing Your Firm’s Operational Privacy Team in 2019

The European Union (EU) passed the General Data Protection Regulation (GDPR) in May 2018. The United States is soon to follow suit by passing its own federal privacy laws. For example, the 2018 California Consumer Privacy Act (CCPA) is a recent tax privacy law that will take effect in January 2020. In the wake of…

Read More

The Importance of Backups: Restoring Data After A Breach

In one year, from April 2016 to August 2017, 14 million small businesses were hacked. Small- to medium-sized businesses have a high risk of cyber attacks for a host of reasons. The combination of the number of attacks and the risk has moved Congress to seek legislation creating a set of resources and guidelines for…

Read More

The 17 Types of Cyber Attacks You’re Likely To Face

When a cyber security attack happens to a big company it hits the news and gets plenty of air time. In a world of virtual money hundreds of thousands can be affected by a data breach. But it’s not just big banks and dating sites that are at risk. Small to medium-sized businesses are the…

Read More

Why Are SMBs Targets For Hackers?

Small to medium-sized businesses, or SMBs, are at the most risk for hacks. If your business has fewer than 1000 employees, there’s a good chance that you’re at risk. Let’s explore why and how hackers target SMBs and how to tighten up your enterprise to avoid a breach. What Makes SMBs At Risk For Hacking…

Read More

4 Ways To Protect Your IoT Devices

Ten years ago the first iPhone hit the market and our lives changed. Sure, there were BlackBerry and Treo phones before then that hinted at the capabilities of internet-capable phones but it was the iPhone that opened us to all the possibilities. The most incredible of those possibilities? The Internet of Things: the network of…

Read More

Is Your Business Prepared for a Cyberattack?

Businesses across all industries are vulnerable to cyberattacks. The threat is particularly great for small and mid-sized businesses that can’t divert resources into full-time, in-house IT security teams. The good news is that managed service providers (MSPs) help overcome these security obstacles. Outsourcing means you’ll have top of the line security solutions for whatever issues…

Read More

How to Identify Spam and Safe from Spoofing, Phishing and Pharming

In the early days of the internet, the dangers of spam were easy to avoid by following a few simple rules. You could dodge most security risks and identity theft by deleting unsolicited attachments and offers from “Nigerian princes.” Then, spam-recognition algorithms became advanced enough to rid us of most of the chaff in our…

Read More

IT Security Best Practices: Saving, Sending & Sharing Files

Information technology has become a vital part of everyday life and business.  The barrier to entry is lower than it’s ever been and there are numerous free technology solutions available for saving files, sharing files, and sending files. Many offer flexibility and accessibility, but it’s also critical to ensure your files are secure.  Here we…

Read More