Ransomware Attack Will Make You “WannaCry”

What happened?

On Friday, May 12, 2017, hackers launched the WannaCry (WannaCrypt) ransomware that has infected over 200,000 Windows users. The global cyberattack has already reached 150 countries.

If infected, a device will lock up and display a message demanding $300 via Bitcoin — an online currency — to restore the encrypted files. The ransom would increase over time; if left unpaid the victim’s files would be locked indefinitely.

This ransomware attack has mostly affected business networks via a security flaw in the Windows operating system. Victims using computers with outdated security patches and targeted in phishing campaigns are especially at risk. Continue reading

Why Your Small Business Needs a Password Manager

Passwords in Your Business 

In today’s world, there’s not much you can do to avoid using passwords. Within your small business, passwords are used to protect your sensitive documents, employee, vendor and customer information, as well as trade secrets, business funds and more. 

Criminals will often target your business – a hub of highly sensitive information – over individuals simply because businesses hold larger pools of valuable data. Even if you follow sufficient security standards, change your passwords regularly and incorporate strict password policies, sometimes bad password habits can still slip through the cracks.

Continue reading

What Happens To Your Information After a Data Breach?

Data breaches have become all-too-common amongst retailers, businesses, educational institutions and health care facilities. Last year, 1,093 data breaches led to over 36 million compromised records in the United States, leaving millions of Americans’ personal information exposed. 

The best way you can protect your information from compromise is by taking proactive measures to safeguard it, especially after a data breach. Follow us as we break down what can happen to your information after a data breach, what the law says about notifying you of breached data and how to secure information that has already been compromised.  Continue reading