CryptoLocker: What To Do If Malware Kidnaps Your Computer Files For A Ransom

December 2013: Good news! You can now decrypt CryptoLocker without paying a ransom. Follow the instructions — Leapfrog approved! It sounds like a fun app or a kids’ Halloween party game – CryptoLocker. Instead, it’s ransomware that’s infecting computers across the US and holding hard-drive data hostage. CryptoLocker gets onto your PC via an email attachment and runs …

Read more

Does Your Company Need To Add Data Leak Protection? How To Decide In 4 Steps

November 2013: Are you including metadata tags on your company’s important files — tags like Private, Restricted, Classified or Super-Duper-007 Top Secret? If not, should you? Tagging your files is a key component of Data Leak Protection (DLP), which strategically protects data by monitoring it and blocking it from being shared with unauthorized people. Us …

Read more

4 Reasons Your Company Should Have Cyber Security Insurance

September 2013: While you’re being super-diligent about protecting your company’s data, you may also to do something just as important: CYA. In this case, that also means Cover Your Assets! Cyber security insurance can cover you for things like data breaches, network damage, cyber extortion, damage-control PR and other unpleasantries, including the cost of getting …

Read more

Who Owns What? 5 Steps to Protecting Your Company’s Intellectual Property

August 2013: Has your company let its guard down regarding its classified information? Does everyone have access to almost everything, except maybe financial and human resources files? Could some team members be confused about what’s yours and what’s theirs? If so, it’s time to leap into action and monitor your intellectual property (IP) — your …

Read more

4 Essential Training Updates: You’re Only As Secure As Your Weakest Link

MAY 2013: It’s easy to get complacent about the things we do everyday — using our smartphones, chatting with friendly people, scrolling through email, and swapping information between devices can become mindless routines.  Yet these things can be the weakest links in your company’s network security! Criminals and hackers love infiltrating our routine habits because …

Read more

3 Factor Authentication: Why You Need It To Protect Your Business

OCTOBER 2012:  Want to lower the odds of someone getting in to your network to as low as one in 100,000,000,000,000? (That’s 100 trillion!) Then add a third layer of protection! It’s not that difficult or expensive to take advantage of three-factor authentication. By layering authentication factors, or the factors that identify your team so …

Read more

Careful Where You Put That! USB Flash Drive Alert

AUGUST 2012:  USB flash drives (or thumb drives) have never been the pinnacle of security but the problem is getting worse for tech-loving frogs worldwide. New and clever malware code is circumventing the usual routes to get at your data. This means each time you pop a drive into your USB port, you could be …

Read more

What Does The Department of Homeland Security Do To Protect Your Cyber Assets?

As we inch toward the somber 10th anniversary of 9/11, many businesses are paying special attention to what President Obama calls “one of the most serious economic and national security threats our nation faces”– cyber security. On the national level, it’s the Department of Homeland Security’s (DHS) job to keep your business infrastructure safe. But …

Read more