Security

/Tag:Security

CIS Control 4

The last few months we’ve taken you through the steps and importance of CIS Controls 1,2 and 3. Today, we introduce you to another vital piece in your security, CIS Control 4. Control 4 is the continued vulnerability assessment remediation. Our first three controls give us an inventory of devices, the software on the network, [...]

November 20th, 2018|Categories: CIS Controls, Security|Tags: , , , |

Avoid Uber’s 148 Million Dollar Privacy Mistake

This week's blog we have a special guest writer- John Wood from Egerton McAfee! Keep reading to get John's legal perspective on how you can avoid making the same privacy mistake Uber made. In September Uber agreed to pay all 50 states a combined $148,000,000 to settle a claim that Uber failed to abide by [...]

November 6th, 2018|Categories: Data Breach, Privacy|Tags: , , , , , , |

Critical Infrastructure

As the month of October is winding down, we wanted to spend the last week of National Cybersecurity Awareness Month informing you about the effect cybersecurity can have on critical infrastructure. While critical infrastructure is not directly a workplace topic, it has the ability to drastically affect our daily work lives. In fact, the National [...]

October 26th, 2018|Categories: Cybersecurity, National Cybersecurity Awareness Month|Tags: , |

Why Passwords Are One of the Weakest Links in Your System

We got three of our team member’s together for a discussion on this week’s technology topic. James Harrell, Kyle Kelley, and Cody Muncy gave us their insight and expertise on why employees and their use of passwords can be one of the weakest links in your system. James, Kyle, and Cody explained that weak links [...]

July 24th, 2018|Categories: Data Breach, Phishing, Security|Tags: , , |

Picking an IT Provider With Cyber Liability Insurance

When hiring an IT provider, you are trusting that they have the skills, knowledge, and experience to manage and support your IT infrastructure, not just when things are going well, but when things go awry. So how do you know if you are hiring the best IT provider for your company? One important and often [...]

May 29th, 2018|Categories: Insurance, IT provider|Tags: , , , |

Security ALERT: New Ransomware Strain Attacking

Many technical and traditional news outlets have been reporting a widespread global outbreak of a new strain of an old ransomware virus that is rapidly spreading. For more information on the specifics see the links below. What should you do? 1. Immediately notify your staff, friends and family to take extra precautions when looking at [...]

August 17th, 2017|Categories: Phishing, Ransomware, Social Engineering|Tags: , , , , |

Cyber Insurance Does Not Pay out for Human Error

Insurers will always work to limit their risk, so it is important for the buyer to be aware of what is in the fine print of any policy. Particularly with the recent WannaCry Ransomware insurers and claimants are you going to be very sensitive right now. That means it is important to know what you [...]

The Cyber Warfare Cell that Worries the West

Is North Korea behind the WannaCry Ransomware strain that hit a couple of weeks ago? A recent Reuters article points out what is happening in North Korea and it seems more and more signs are point towards their work. As you read the article it is obvious how underground, widespread and dangerous the world of [...]

USB Sticks Could Infect Your Network

We ALWAYS recommend strict and tight controls around the use of USB sticks or drives in your environment. They have long been the carriers and purveyors of malware and viruses on corporate networks. If you currently do not block the use of USB drives on laptops and computers you absolutely should be - now! Here [...]

January 24th, 2017|Categories: Phishing, Security, Social Engineering|Tags: , , , |

Recently Reported Healthcare Cyber Attacks

A recent blog post in HealthITSecurity lists three recent healthcare cyber attacks. It's important to read the information and see how smaller practices are being compromised and the work they are doing to remediate, and report the incident. Remember these simple things to help protect yourself and your organization: Training, training, education, education, awareness, awareness. [...]

January 9th, 2017|Categories: Phishing, Ransomware, Security, Technology|Tags: , , |