Category Archives: Security

Image of ransomware attack with a warning sign and the words: "Your files are encrypted."

How to Detect and Prevent Ransomware Attacks

Ransomware attacks are on the rise. Here’s how your business can detect and prevent them. 2017 has seen an increase in prominent ransomware attacks, and experts warn that they are likely to grow more common. So far, 2017 has seen two significant ransomware attacks: WannaCry, which began in May, and NotPetya, which followed a couple […]
IT specialist working to recover data from a computer backup.

IT Emergency Planning: How to Prepare for the Worst

How can you protect your data and IT resources in case of an emergency? Each year, companies invest billions of dollars into their IT systems. These include their networks, the hardware and software on which they run, and the processes they use to manage everything. Protecting this investment should be a top priority for your […]
image of clock face imposed over a crowd of rushing businessmen.

DDoS Attack Prevention: How to Detect and Mitigate a Threat

What is a DDoS attack, and how can you protect your business? Distributed Denial of Service (DDoS) attacks are an increasingly common—and increasingly difficult to prevent—form of cybersecurity threat. When businesses first experience a DDOS attack, they frequently misdiagnose the situation as a down server or a failed application. This is because DDoS attacks target […]
cybersecurity, lock on keyboard

5 Client Data Protection Tips to Keep Your Customers Safe

5 ways your business can manage security to protect sensitive client information. Losing sensitive client data, such as login credentials, credit card information, medical records, or financial reports, can have disastrous consequences for your business, from both a legal and PR standpoint. Fortunately, there are steps you can take to safeguard against these security breaches. […]
woman at a computer in a coffee shop

Should Your Business Have a BYOD Policy?

Does your company have a Bring Your Own Device policy? Bring Your Own Device (BYOD) policies are increasingly popular among employers and employees alike. Many employees are more comfortable using their own devices, as it allows them remote access to work documents without the hassle of a second device. And from an employer perspective, BYOD […]
graphic of lock dissolving into zeros and ones.

How to create an Incident Response Plan for your business.

Time is critical in reporting a security breach. Is your business prepared? In the case of a security breach, a speedy response time is critical to protecting data. Take two important examples of security incidents: the Target hack, and Google’s recent phishing scam. In the first, Target’s failure to notice and respond to the security […]
An illustration of a computer and a cell phone showing how multi factor authentication can be used to log in to an account.

How Multi Factor Authentication Protects Information Security

What is multi factor authentication? Multi factor authentication is when a user must provide evidence from two or more sources to prove their identity. Typically this information should come from separate categories, such as a thing they own (a bank card), a thing they know (a password), or something they are (a finger print). A […]