Category Archives: Cyber Security

people looking at a computer learning how to spot a phishing email

How to Spot a Phishing Email

First, you must train yourself to spot the signs of a phishing email. Second, you must practice. Then, you can protect yourself and your company. STOP and ask yourself, am I expecting this email? When you are in a rush or on a phone email app, STOP and ask yourself, can this wait until later to check more closely? If it doesn’t seem quite right, or expected, question it. If it appears to be from a co-worker, don’t reply, call them to verify any requests. Phishing emails can look just

cyber security policy

How Does Ransomware Work?

Ransomware is a major problem for companies around the globe. Did you know businesses lose about $8,500 per hour because of ransomware-induced downtime, according to Comparitech? The CISA reports that, even though agencies and governments remain vigilant to uphold data security, malicious actors continue to reinvent their ransomware tactics. According to KPMG, the Covid- 19 pandemic opened doors to a surge in ransomware as cyber criminals targeted the less fortified computer systems belonging to people working remotely. For a ransomware attack to be successful, it first needs to gain access

Let password managers remember

What is a Password Manager?

Today, nearly every adult and child has at least one password. Most have nearly 100! The statistics around password management are rather grim. The most commonly strategy is writing them down in a notebook (31%). Remembering passwords is also a popular technique reported by 26% of the participants. (NCA). The most startling stat is only 45% of adults would change a password after a breach. (Google). The reason is it is hard for people to create and manage their passwords using only their memory. It’s time to change your strategy

Using a password manager will save you time, protect you and keep you more secure

How to Use a Password Manager

First select a Password Manager – this blog shares some options. This example is using 1Password, but it’s a very similar process with all of them. It will show you the basics of how to use any password manager. You will need to download the application for your phone and your computer. You will also need to download it for all the browsers you use. It may be easiest to setup the account on a computer. You will start with a login username and password. Create a strong password by

Gone Phishing: 4 Ways to Protect Yourself from Scams

Have you been surfing through a website or emails and had a message calling you to reveal personal information such as credit card numbers or passwords? You may have been subject to phishing. Phishing is an attack in which scammers pretend to be legitimate websites to collect personal information. Cybercriminals also use phishing to deliver malware to users. The following four tips will help you avoid such security threats. How to Spot a Phishing Message If you are to protect yourself from phishing, the first step would be learning how

Business Email Compromise is Your Biggest Treat

How an Email Breach Can Cost Your Business Thousands

In 2021, America experienced an unprecedented increase in cyber attacks and malicious cyber activity. Business Email Compromise is the most frequent attack vector.  The FBI received nearly 20,000 complaints in 2021 that cost US businesses 2.4 billion. The second most costly digital crime type, investment scams, tallied about $1.5 billion in estimated losses. Your email account is an important part of your communication with employees, customers, and vendors. It’s often the everyday information that opens your business to attack, like who approves purchases, what applications you use, how you communicate

network security threats

How to Keep Your Company Safe From Network Security Threats

The number of businesses adopting online or digital services keeps growing yearly because of the many benefits they gain. That said, the transition to digital service forms comes with the risk of data breaches and network security threats. In cases where data thieves are successful, businesses often have to pay ransom to reacquire it or risk starting from scratch. According to PurpleSec, a 2019 study showed that 34% of businesses hit with malware took a week or more to regain access to their data. For businesses looking to better protect

12 Password Best Practices

With the business world heavily reliant on digitalization in this day and age, the use of technology in your organization is unavoidable. Although technology can undeniably give your business an advantage in increasingly competitive markets, there are many troublesome areas to keep an eye on. This is why interest in cybersecurity has risen in recent years. Password protection is the best place to start if you want to ramp up your cybersecurity. Setting a password to secure an entity’s data is called password protection. Only those with passwords can access

Business Email Compromise is Your Biggest Treat

Business Email Compromise is Your Biggest Threat

What is Business Email Compromise? In a Business Email Compromise is also know as a BEC scam, or email account compromise (EAC). It’s when criminals send an email message that appears to come from a known source making a legitimate request. Every week this month we’ve assisted a business with a breach caused by stolen email credentials. It is by far the most lucrative attack for cybercriminals. Businesses need to start taking cybersecurity more seriously, as one government agency is warning that ignorance of best practices can lead to “catastrophic

What is Driving Compliance

What is Driving Business Compliance?

There’s a long list of compliance requirements for businesses. PCI and HIPAA compliance are long-standing regulations that have driven credit card acceptance and healthcare entities for decades. Some that have tried to improve the security posture of impacted businesses, like CMMC with manufacturers, but have struggled to gain implementation and adoption. So, what is the strongest driver of compliance for your business today? Insurance and Supply Chain. Insurers are Driving Compliance Cyber Liability Insurance has been around quite a while, but due to the significant increase in breach incidents, they