Combating Ransomware: Back Up, Patch Up, Catch Up

April 2017 Feature Image

Ransomware strikes, panic sets in 

Ransomware, the computer malware designed to hold your devices and files ransom, can pose a huge threat to your company. Once a device is infected, it only takes a few seconds for a ransom note to display —demanding payment in exchange for a key to unlock your system. Until you pay the ransom, your device is virtually useless. And even if a payment is made, there’s no guarantee that the hacker will unlock your device. In short, you’re left with two choices: dig into your business funds to pay the ransom or let the hackers keep your files and hope they don’t further misuse your compromised information?

As a business owner, this is a decision that you should never have to make. Continue reading

Public Information Threatens Your Business Security

Business Post_Public Information Feb 2017

Is your business more public than you think? 

In this overwhelmingly information-rich world, the answer is a definite yes. And if it’s public information, it has every legal right to carry on. 

Among social media platforms, review sites, consumer blogs, industry forums and business search databases, there’s a good chance that you’re being talked about. People flock to this public information so they can get a better picture of your company from others’ experiences. This includes current and prospective customers, as well as potential business partners.  Continue reading

Is IoT Opening Up Your Business to Cyberattacks?

IoT Technology in Business

Finding solutions to help your company run smoother and faster is what you do as a business owner. Since the Internet of Things (IoT) (aka “smart” devices) assist with efficiency, it’s likely that these devices have a regular role in your business. As of 2016, 65 percent of U.S. businesses use IoT technology — devices that are connected on the same network and embedded with sensors, software and the ability to collect and share data. 

Unfortunately, the very reasons that these technological powerhouses improve your processes can also puncture holes in your business’ security. Will this make you think twice about using them?  Continue reading