Archive for December 2018
Smaller Firms Less Likely to Keep Up to Date on the Basics That Protect Them
On the never ending problem of cyber security, small firms often do not have any/much in-house IT support. As a consequence, they may be less likely to be able to make sure their software is consistently updated to reflect any patches released by the product’s maker. This simple oversight, deliberate or not, is a major…
Read MoreCyberattacks and The Vulnerability of The Small Business
You cannot go a day without reading about some big name company or even government agency being hacked and critical data being compromised. What you don’t see in the media is that most of the attacks happen to small firms, and that this is where a lot of the cybercrime is occurring. What any business,…
Read MoreDenial is Not a Solution
Why do so many people procrastinate about making a will? Why is it so hard to get young people to buy health insurance? Because it is one of those “probably won’t happen–at least in the foreseeable future, and I‘ve got more interesting things to worry about or spend my money on” issues. Small business owners…
Read MoreLimited Investment Capital and Planning for Trouble
Small businesses often fail to take the time to make business continuity plans. One aspect of a business continuity plan involves developing plans to handle the loss of physical infrastructure and hardware. Unfortunately, smaller and younger firms often fail to address these issues because they lack the necessary capital to invest in additional or supplemental…
Read MoreData Protection Laws and PIIs
Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these laws are wide ranging, most of these laws reference Personally Identifiable Information (PII) This “refers to information that can be used to distinguish or trace an individual’s identity, either alone or when combined…
Read MoreAre You Subject to Data Protection Laws?
This blog introduces a new topic that many may be unaware of Data Protection laws. These are laws that define fully, or in part, what type of data is covered by government regulations, prescribe general standards for the securing of covered data, and may also require notification of victims and governmental authorities in the event…
Read MoreRansomware: Part II
In our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what you can do to avoid falling victim. Prevention is the best cure. Follow standard “data hygiene” principles that you probably hear about all of the time. Update your OS, software, and apps…
Read MoreRansomware: Part I
The daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten the success of your business. There are so many different things that can attack your computer, steal your data, and wreck your day. One of the most troublesome has been the development of ransomware.…
Read MoreHumans Cause So Much Trouble
Have you been focusing on software packages and anti-virus tools to protect your data from hacking? That may not be enough, because it overlooks one of the biggest causes of security breaches. All of the security software and expertise in the world is useless if you or your employees don’t remain vigilant about their behavior…
Read MoreThe Most Boring Topic Ever
Yes, today’s blog is about office phone systems. You have one. They are dull, necessary, and no one wants to deal with them. They need to be re-configured for new employees, they’re confusing, and the telco lines probably cost you more money than you’d like. Like everything else, office phone systems began transitioning to fully…
Read More