How Phishing Emails Led To Target’s Massive Breach: 5 Steps Your Company Should Take Now

March 2014: Think email phishing isn’t a big deal? Think again! Hackers sent phishing emails to one of Target’s HVAC vendors and got exactly what they were looking for —  backdoor access into the retail giant’s network! Even if you don’t have point of sale (POS) devices, scammers can still get into your network by …

Read more

Malware Botnets: Is Your Computer Part Of A Secret Zombie Army? (Seriously.)

January 2014: Is a nasty piece of malware hiding inside your computer, waiting for instructions to turn itself on and suck up your personal information? Hopping horror! Recently nearly two million login credentials for more than 93,000 websites, including Facebook, Gmail, YouTube, Yahoo!  Twitter and ADP, were stolen by “zombies.” Here’s how to find out …

Read more

CryptoLocker: What To Do If Malware Kidnaps Your Computer Files For A Ransom

December 2013: Good news! You can now decrypt CryptoLocker without paying a ransom. Follow the instructions — Leapfrog approved! It sounds like a fun app or a kids’ Halloween party game – CryptoLocker. Instead, it’s ransomware that’s infecting computers across the US and holding hard-drive data hostage. CryptoLocker gets onto your PC via an email attachment and runs …

Read more

Does Your Company Need To Add Data Leak Protection? How To Decide In 4 Steps

November 2013: Are you including metadata tags on your company’s important files — tags like Private, Restricted, Classified or Super-Duper-007 Top Secret? If not, should you? Tagging your files is a key component of Data Leak Protection (DLP), which strategically protects data by monitoring it and blocking it from being shared with unauthorized people. Us …

Read more

4 Reasons Your Company Should Have Cyber Security Insurance

September 2013: While you’re being super-diligent about protecting your company’s data, you may also to do something just as important: CYA. In this case, that also means Cover Your Assets! Cyber security insurance can cover you for things like data breaches, network damage, cyber extortion, damage-control PR and other unpleasantries, including the cost of getting …

Read more

Who Owns What? 5 Steps to Protecting Your Company’s Intellectual Property

August 2013: Has your company let its guard down regarding its classified information? Does everyone have access to almost everything, except maybe financial and human resources files? Could some team members be confused about what’s yours and what’s theirs? If so, it’s time to leap into action and monitor your intellectual property (IP) — your …

Read more

4 Essential Training Updates: You’re Only As Secure As Your Weakest Link

MAY 2013: It’s easy to get complacent about the things we do everyday — using our smartphones, chatting with friendly people, scrolling through email, and swapping information between devices can become mindless routines.  Yet these things can be the weakest links in your company’s network security! Criminals and hackers love infiltrating our routine habits because …

Read more

3 Factor Authentication: Why You Need It To Protect Your Business

OCTOBER 2012:  Want to lower the odds of someone getting in to your network to as low as one in 100,000,000,000,000? (That’s 100 trillion!) Then add a third layer of protection! It’s not that difficult or expensive to take advantage of three-factor authentication. By layering authentication factors, or the factors that identify your team so …

Read more

Careful Where You Put That! USB Flash Drive Alert

AUGUST 2012:  USB flash drives (or thumb drives) have never been the pinnacle of security but the problem is getting worse for tech-loving frogs worldwide. New and clever malware code is circumventing the usual routes to get at your data. This means each time you pop a drive into your USB port, you could be …

Read more