With the vast majority of end users turning to Google as their search engine or default browser of choice, it comes as no surprise to learn that the company takes security seriously. But in a perpetually changing landscape where anti-virus and anti-malware tools are constantly chasing their tails in order to stay up to date with the latest threats, there cannot be many small to medium-sized business owners who can afford to ignore the issues surrounding cyber security.
We have addressed previously the fact is that the human is the weakest link in any security chain. There are unfortunately many ways that the human link can be disrupted. In this article we will address one of those, one that may in fact be the weakest link in the weakest link – Passwords.
For the last 4 years, Shred It, the document destruction company has been sponsoring an international survey to gauge business executives’ attitudes towards security. The latest one, from 2014, shows that in America executives are actually de-prioritizing security within their organizations.
You and probably everyone in your business has been the subject of a phishing attack at some point. If you receive email, you have received a phishing email. What exactly is a phishing attack? Broadly defined, Phishing means an exploratory attack on a broad audience.
Original Article: http://thevarguy.com/business-technology-solution-sales/061015/top-security-areas-sps-need-focus
As a professional in the IT field for 20 years, I believe this is a great article because it demonstrates in a few paragraphs all the things we are constantly reminding our clients.
Here's the latest news in online hacking!
Researchers revealed in early December that hackers had compromised approximately two million accounts across 93,000 websites including Facebook, Google, LinkedIn, Yahoo! and Twitter. This breach in data (and confidentiality) was a result of keylogging software maliciously installed on an unknown number of computers around the world.
In today's fast-paced, hi-tech world, wi-fi has become a commodity. Starbucks, Panera Bread, local cafe's, even your local McDonald's has free wi-fi available for its patrons. It's very convenient, however you could be opening yourself up to online ID theft and security breaches if you aren't careful.
Ransom has taken on a new meaning in today's internet based business world. Just like the episode of CSI Vegas where Nick Stokes was buried alive and only had so many hours to live. In the case of the Crypto Locker Virus, your valuable data is encrypted and you are required to pay ransom money or it all is destroyed in 100 hours.
Cloud file sync and sharing tools provide great benefits to your business. Why? There are a number of great reasons that cloud file sync has a place in your business -
1. Work from anywhere - no VPN needed. Access on your data at 30,000 feet!
2. Easily collaborate with other team members across the globe
3. Eliminate your need for a file server? Maybe.
One question we are getting lately from many customers lately is how to manage the influx of employees' devices that can connect to the corporate network. We call this phenomenon BYOD, or Bring Your Own Device. The device can be a smartphone such as an iPhone or Android, a tablet like the iPad, or even a home PC or laptop.