Given the rate at which technology security risks evolve, a security training program must align itself with what’s current. With a focus on security awareness, your program will be more valuable and you can avoid losing money – and your reputation – on data breaches. According to a study titled “2020 Security Priorities Study,” there are many new concerns tied to the pandemic. This only strengthens security experts’ long-held belief that more education on security risks is what every … [Read more...]
The Loss of an Employee: How Can MSPs Prepare?
As an MSP, or as any type of employer, what should be done in the event of an employee's loss of life? This is a question that is extremely important, yet rarely discussed. Do you have a thorough and reliable security and business plan in place should an employee suddenly die? It is probable that you already have a designated path to follow should they be fired or if they were to quit. However, many companies simply do not pre-strategize for death. What Happens When an Employee Death … [Read more...]
Cyber Security Best Practices for Top Concerns in 2021
Cyber security should never be an afterthought – especially not with the current landscape where companies from the small mom-and-pop shops to massive corporations are targeted with almost equal enthusiasm. Yet coming up with a solid strategy can be daunting, especially given all the products on the market today. If you follow these cyber security best practices, you’ll have good footing for getting where you need to be. Before you can know how to protect yourself, you must know where the … [Read more...]
Zero-Tolerance for Cheap Cyber Security is a Must
Cyber security is among the most important investments for any company. Why is this? While there are so many reasons, here is an important example: What happens if your company's Book of Business gets stolen, or is accessed without permission by one of your competitors? Not having invested in a reliable and stable cyber security subscription would allow your customer-base to be public - Just imagine what impact that would have on your company. A zero-tolerance threshold for a cheap solution … [Read more...]
Cybersecurity: Important Considerations for Remote Workers
There have been many business changes since the Pandemic occurred and some of them are here to stay. Working from home, or at least not going to the office every day, has become the new normal for over 2/3 of the American working population. This introduces many new, and old, challenges for the realm of Cybersecurity. Culture vs. Best Practice Our cultural laziness, due to the perceived protection of privacy while we are surfing the web at home, bleeds into working from this same … [Read more...]
Threat Modeling Anticipates Cyber Attacks
As enterprises struggle to keep up with various forms of cyber attacks, many are discovering the benefits of threat modeling. This process is a structured way to identify threats and vulnerabilities to enterprise security and rank the risk and potential damage of each so that mitigation efforts can be prioritized. While this is a broad definition, the key to threat modeling that differentiates the technique from more general security efforts is that it is highly structured and systematic. Its … [Read more...]
Taking Precautions to Avoid a Data Breach
When asked what their top concerns are, the vast majority of IT leaders will list a data breach quite high. That’s not new news, but what might be shocking is that these same leaders aren’t always setting a great example. According to Egress, a data security solutions company, its global survey found that 78% of IT leaders believe that their employees have put data at risk within 12 months prior to the survey. The reason this is troublesome is because many data breaches are the result of … [Read more...]
Addressing Your Cyber Security Policy
A cyber security policy isn’t a set-it-and-forget-it proposition, especially today as cyber attacks increase at an alarming rate. Approaching a policy with a deep understanding of your needs, including the infrastructure that must be in place to protect data and who is to be held accountable, is important. Revisiting aspects of the policy on a continuing basis can also protect your environment from eminent danger. What’s protecting your critical information? Where is it being stored? Who has … [Read more...]
Cyber Security: Evolving Is Crucial to Survival
There is so much discussion about data breaches that it is easy to risk becoming complacent. That’s a dangerous position to reach. A casual attitude on cyber security can leave gaps in your security strategies that leave your enterprise vulnerable to serious, and potentially detrimental, loss. There are a few reasons why security doesn’t get the respect that it should. In some cases, a small- to medium-sized business feels they don’t have the resources to stay current with cyber security best … [Read more...]
The Difference Between Business Continuity and Disaster Recovery
If you’ve been thinking in terms of business continuity and disaster recovery being interchangeable, it may be time for you to get a better understanding of the strategies that keep your company viable during a crisis. While some areas are more susceptible to hurricanes, like in Florida or Louisiana, and companies in the Midwest may be more likely to see a tornado destroy their business, any location can be affected by a building fire or a broken water pipe. Likewise, all companies can be … [Read more...]