Email phishing is one of the most common ways accounts are hacked. The number of compromised accounts continues to rise as hackers are utilizing more advanced techniques and many organizations lack the necessary tools to monitor unusual account behavior. Here are 10 signs that will help you recognize if your account has been hacked.Read More
In less than a year, January 14, 2020, four of Microsoft’s operating systems will be reaching their End of Life: Windows Server 2008 R2, Exchange 2010, Windows SBS 2011, and most notably, Windows 7. Meaning, Microsoft will no longer provide security updates, customer service, or even technical support for those products. They will still be available to use, but that comes at a security risk.Read More
According to recent research, most businesses will not patch critical security breaches, even after 3 full months. When these openings are left undefended, all of a business’s personal information, financial records, and data can be stolen. This can create serious threats to any business, especially when a patch is already available to solve the problem.Read More
If you own or manage a business on or near the Atlantic Ocean, you are aware that the Atlantic Hurricane Season runs from roughly May through November each year. Last year’s hurricane season produced six major hurricanes of Category 3 or higher and racked up $282.16 billion in total damages - the costliest tropical cyclone season on record. The most damaging of these storms, Maria was a Category 5 hurricane with maximum sustained winds of 175 mph.Read More
Reprinted with Permission from Behind the Counter, a Community Journals Publishing GroupRead More
Topics: EDTS Cyber
If a client has contacted you about a suspicious email sent from your account, take action immediately. It may be a warning signal that a hacker has not only gained access to your email account, but to your company's network as well.Read More
Don’t rush through your unread emails this tax season. Sophisticated W-2 phishing scams are likely to hit your inbox soon.Read More
We talk with many company leaders who have implemented the fundamentals of cyber security but still feel unprepared to face today's cyber attacks.
Anti-virus, anti-malware, firewall, data backups, phishing awareness education for employees, and encryption of sensitive data are often deployed and managed in-house or by a managed I.T. services provider. The importance of these I.T. security fundamentals is indisputable—but a majority of breaches happen behind the firewall.Read More
According to research commissioned by IBM, the ideal spend on Cyber Security is 9.8 to 13.7% of your I.T. budget.  This percentage is estimated to grow along with the increased integration of security into all facets of I.T. infrastructure.Read More
As we close a particularly difficult hurricane season, we're more thankful than ever to have found an innovative backup solution developer and partner, Datto. Following Hurricanes Harvey and Irma, Datto was on location helping install and deploy emergency backups.
These backups help anyone threatened by business downtime recover company data and resume operations almost instantly. Because the threat of downtime doesn't disappear with hurricane season, we've compiled a list to help you prepare your business for a potential natural disaster or power outage.Read More