If you own or manage a business on or near the Atlantic Ocean, you are aware that the Atlantic Hurricane Season runs from roughly May through November each year. Last year’s hurricane season produced six major hurricanes of Category 3 or higher and racked up $282.16 billion in total damages - the costliest tropical cyclone season on record. The most damaging of these storms, Maria was a Category 5 hurricane with maximum sustained winds of 175 mph.
Read MoreDon’t rush through your unread emails this tax season. Sophisticated W-2 phishing scams are likely to hit your inbox soon.
Read MoreTopics: Security Alerts, Phishing, Cyber Security Tips, Most Popular
According to research commissioned by IBM, the ideal spend on Cyber Security is 9.8 to 13.7% of your I.T. budget. [1] This percentage is estimated to grow along with the increased integration of security into all facets of I.T. infrastructure.
Read MoreTopics: Cyber Security, Cyber Security Policies & Procedures, EDTS Cyber, Cyber Security Tips, IT Budgeting, Cyber Security Budgeting, Cyber Security Assessments
I have a hunch: as a merchant, keeping your shoppers secure is of utmost importance to you. But PCI-DSS requirements can be overly technical, confusing, or simply not applicable to your situation.
When holiday shopping season rolls around, you might feel as though you're simply hoping for the best.
Read MoreTopics: Cyber Security Tips, PCI-DSS, PCI, Cyber Security Policies & Procedures, Cyber Security
Don't worry about data backups anymore. That's right, I said it. Don't even concern yourself with backing up your company's data.
Read MoreTopics: Backup and Disaster Recovery, Business Continuity, Datto
Aligning your criminal justice organization’s practices with CJIS standards has most likely presented continual challenges. Time, resources, and budget approval are just a few concerns we hear from agencies seeking to prepare for the next CJIS audit.
Read MoreTopics: CJIS, Compliance, Cyber Security
Ransomware is not just "trending" among hackers. The first known case occurred in 1983 and, over the past 24 years, has evolved into cyber criminals' most favored tool for making fast cash from unwitting businesses of all sizes.
Read MoreTopics: Phishing, Ransomware, Cyber Security, EDTS Cyber, Most Popular
It's already been a week since Equifax announced the massive security breach that affected 137 million consumers.
Out of the 100's of news pieces and social media comments, here are 3 articles you should read (or re-read) to help you cut to the chase and respond effectively:
Read More"Regular backups are a great way to combat ransomware attacks." You've heard it said before, at the end of news stories and PSA's about ransomware like WannaCry and Nyetya, and it's true—in theory.
Traditional backups are actually almost as vulnerable to ransomware as your business's primary system, depending on how the two are connected. Thankfully, backup technology has come a long way.
Read MoreTopics: Backup and Disaster Recovery, Business Continuity, Datto
Cyber security, sometimes shortened to "cyber," is the protection of computers, computer networks, and digital information from unwanted use and harm.
Read MoreTopics: Cyber Security, EDTS Cyber, Most Popular