Blog
You may have noticed your inbox full of “privacy policy and terms of service” updates recently. The reason for this is that the European Union’s General Data Protection Regulations (GDPR) policy became effective May 25, 2018, and companies are rushing to be compliant – that is, to clarify and be transparent about the agreements they […]
Ransomware is one of the worst cyber disasters that can befall SMBs. Not only do they run the risk of loss of data, privacy, and their customers’ trust and future business, they also run the risk, even if the ransom is paid, of never recovering their data. Worse, if the SMB’s information is shared with […]
Malicious exploits and ransomware demands are just a few of the many challenges facing businesses this year, but even though 62% of all attacks hit SMBs, most small to medium enterprises are still not adequately prepared. Take a close look at the items on this list, and decide where your SMB should hone in on […]
Security breaches are a significant threat in a standard office environment; however, when an organization has employees working from home or on the go, these risks become even greater . 1 Road warriors use mobile devices such as laptops, tablets and smartphones with internet connectivity while traveling to conduct business. Despite increased awareness, many employees do […]
In September 2017 Datto released its 2nd Annual State of the Channel Ransomware Report. In this, the most extensive study of its kind, researchers surveyed over 1700 Managed Service Providers (MSPs) who support over 100,000 small-to-mid-sized businesses (SMBs) around the globe. The report presents the survey’s key findings and includes significant detail on ransomware trends, […]
What’s your recovery protocol? A security breach has the potential to devastate your SMB so being prepared is critical. You and your team should have a protocol in place to deal swiftly with a breach and mitigate the damage it can cause. The attached infographic lists six immediate steps to take if you are hacked, […]
Unfortunately, most business owners don’t consider their client data worthy of theft, ransom or other interference and they underestimate the ramifications of a breach. Sadly, they are in for a rude and costly awakening when an attack or breach occurs. What business owners don’t realize is that hackers are often after customer data – billing […]
Does your current antivirus prevent breaches and infections without having any prior knowledge of attacks or malware? HitmanPro.Alert blocks the core techniques and exploits malware uses to hide from antivirus software. It also detects intruders like banking malware, remote access tools, and crypto-ransomware, simply by observing the behaviors that these threats exhibit. It even makes […]
The first question a small or mid-size business owner asks about outsourcing the management of their information technology is: Why do we need managed services? We have employees that know about software, programming, servers, firewalls, backup systems and so on, right? Why use managed services? IT companies offer a managed service option to their clients […]
A mind-game is difficult to identify, so is a well-crafted social engineering scam. Both are forms of psychological manipulation; neither is welcome in your business. Today’s socially engineered phishing attacks are so sophisticated that even your most knowledgeable employees’ may be convinced to open a virtual (or actual) door and let one slip through to […]