You and probably everyone in your business has been the subject of a phishing attack at some point. If you receive email, you have received a phishing email. What exactly is a phishing attack? Broadly defined, Phishing means an exploratory attack on a broad audience.
With cyber attacks becoming a seemingly monthly occurrence, more and more these days it seems like simple passwords just aren’t cutting it when it comes to online security. Because of this, a lot of online services use two-factor authentication.
Original Article: http://thevarguy.com/business-technology-solution-sales/061015/top-security-areas-sps-need-focus
As a professional in the IT field for 20 years, I believe this is a great article because it demonstrates in a few paragraphs all the things we are constantly reminding our clients.
Log on to Facebook, Instagram or Twitter, or even simply take a walk in a city park, and one thing is clear: the selfie revolution is upon us. And now it looks as though this contemporary pastime is becoming more than just a social media trend. Major industry players are now using facial recognition technology to replace passwords as the new method of online identification.
Here's the latest news in online hacking!
Researchers revealed in early December that hackers had compromised approximately two million accounts across 93,000 websites including Facebook, Google, LinkedIn, Yahoo! and Twitter. This breach in data (and confidentiality) was a result of keylogging software maliciously installed on an unknown number of computers around the world.
In today's fast-paced, hi-tech world, wi-fi has become a commodity. Starbucks, Panera Bread, local cafe's, even your local McDonald's has free wi-fi available for its patrons. It's very convenient, however you could be opening yourself up to online ID theft and security breaches if you aren't careful.
Ransom has taken on a new meaning in today's internet based business world. Just like the episode of CSI Vegas where Nick Stokes was buried alive and only had so many hours to live. In the case of the Crypto Locker Virus, your valuable data is encrypted and you are required to pay ransom money or it all is destroyed in 100 hours.
Cloud file sync and sharing tools provide great benefits to your business. Why? There are a number of great reasons that cloud file sync has a place in your business -
1. Work from anywhere - no VPN needed. Access on your data at 30,000 feet!
2. Easily collaborate with other team members across the globe
3. Eliminate your need for a file server? Maybe.
One question we are getting lately from many customers lately is how to manage the influx of employees' devices that can connect to the corporate network. We call this phenomenon BYOD, or Bring Your Own Device. The device can be a smartphone such as an iPhone or Android, a tablet like the iPad, or even a home PC or laptop.