Call Us Today to learn more: 888-646-1616

About Josh Ablett

This author has not yet filled in any details.
So far Josh Ablett has created 40 blog entries.

The Best Ways to Fight Banking Trojans

Banking Trojans are back, and they're nasty. Click on the wrong email, and hackers drain your firm's operating accounts. Incredibly, many of these attacks even defeat your bank's two-factor authentication. Here's a great article that explains how banking trojans bypass two-factor authentication. So what should every business do to protect yourself against banking trojans? The [...]

By |2018-12-06T16:14:17+00:00December 5th, 2018|Computer Cyber Security, Email Cyber Security|0 Comments

Getting Started with AWS Cloud Security – 14 Step Guide

Want to get started in Amazon Web Services but worried about cloud security?  This step-by-step guide shows you the right way to get started in Amazon Web Services.  Cloud security is a must! 1) Create your account. Go to https://aws.amazon.com/ and click on the “Sign in to the Console” button. Follow the steps to set [...]

By |2018-10-17T19:37:11+00:00October 2nd, 2018|Cloud Cyber Security, Computer Cyber Security|1 Comment

Five Cheap Data Loss Prevention Tools

Companies that need to comply with privacy laws like HIPAA, PCI, GLBA, etc. need to worry about data loss prevention tools. “Data loss prevention” typically refers to preventing employees from deliberately stealing or accidentally leaking sensitive data. The typical stack to data loss prevention tools include: Blocking or monitoring USB drives Blocking or monitoring CD/DVD burners [...]

What is WannaCry and 6 Ways to Protect Your Business from Ransomware

WannaCry ransomware infected hundreds of thousands of computers in May 2017. WannaCry infects a computer, encrypts files and demands payment to decrypt the files. Although this article was first published in 2017, the information about ransomware is still relevant today. WannaCry variants are sure to exist and may unfortunately impact you or your business [...]

By |2018-10-17T19:19:44+00:00October 1st, 2018|Computer Cyber Security, HIPAA|0 Comments