7 Risky Security Practices: Are Your Employees Doing Any of These?

September 2014: Could your employees’ bad habits be putting your company at risk? Your employees don’t usually intend to be a weak link, but chances are they don’t fully understand what they’re supposed to do and why. Great policies help employees develop great habits! Great policies are short, clear, specific and easy to follow. Too …

Read more

BYOD Update: What’s the Difference Between Mobile Security and Mobile Device Management?

August 2014: Mobile security was not that big a deal before smartphones leapt onto the scene. You just synced your contacts, calendar and email onto your Personal Digital Assistant (PDA) over USB and that was it. When WiFi and cellular data plans hopped in, PDAs and mobile phones fused into smartphones — BlackBerrys, specifically, became …

Read more

Heartbleed and You: The Official Frog Report

May 2014:  One of the most widespread bugs ever to mess with the World Wide Web was just discovered — Heartbleed. To make matters worse, the bug has been around for two years! As most of the Internet scrambled to patch and protect itself from this massively pervasive security problem, many recommendations were tossed around. …

Read more

How Phishing Emails Led To Target’s Massive Breach: 5 Steps Your Company Should Take Now

March 2014: Think email phishing isn’t a big deal? Think again! Hackers sent phishing emails to one of Target’s HVAC vendors and got exactly what they were looking for —  backdoor access into the retail giant’s network! Even if you don’t have point of sale (POS) devices, scammers can still get into your network by …

Read more

Malware Botnets: Is Your Computer Part Of A Secret Zombie Army? (Seriously.)

January 2014: Is a nasty piece of malware hiding inside your computer, waiting for instructions to turn itself on and suck up your personal information? Hopping horror! Recently nearly two million login credentials for more than 93,000 websites, including Facebook, Gmail, YouTube, Yahoo!  Twitter and ADP, were stolen by “zombies.” Here’s how to find out …

Read more

CryptoLocker: What To Do If Malware Kidnaps Your Computer Files For A Ransom

December 2013: Good news! You can now decrypt CryptoLocker without paying a ransom. Follow the instructions — Leapfrog approved! It sounds like a fun app or a kids’ Halloween party game – CryptoLocker. Instead, it’s ransomware that’s infecting computers across the US and holding hard-drive data hostage. CryptoLocker gets onto your PC via an email attachment and runs …

Read more

Does Your Company Need To Add Data Leak Protection? How To Decide In 4 Steps

November 2013: Are you including metadata tags on your company’s important files — tags like Private, Restricted, Classified or Super-Duper-007 Top Secret? If not, should you? Tagging your files is a key component of Data Leak Protection (DLP), which strategically protects data by monitoring it and blocking it from being shared with unauthorized people. Us …

Read more

4 Reasons Your Company Should Have Cyber Security Insurance

September 2013: While you’re being super-diligent about protecting your company’s data, you may also to do something just as important: CYA. In this case, that also means Cover Your Assets! Cyber security insurance can cover you for things like data breaches, network damage, cyber extortion, damage-control PR and other unpleasantries, including the cost of getting …

Read more