Call Us Today to learn more: 888-646-1616

The Best Ways to Fight Banking Trojans

Banking Trojans are back, and they're nasty. Click on the wrong email, and hackers drain your firm's operating accounts. Incredibly, many of these attacks even defeat your bank's two-factor authentication. Here's a great article that explains how banking trojans bypass two-factor authentication. So what should every business do to protect yourself against banking trojans? The [...]

By |2018-12-06T16:14:17+00:00December 5th, 2018|Computer Cyber Security, Email Cyber Security|0 Comments

Getting Started with AWS Cloud Security – 14 Step Guide

Want to get started in Amazon Web Services but worried about cloud security?  This step-by-step guide shows you the right way to get started in Amazon Web Services.  Cloud security is a must! 1) Create your account. Go to https://aws.amazon.com/ and click on the “Sign in to the Console” button. Follow the steps to set [...]

By |2018-10-17T19:37:11+00:00October 2nd, 2018|Cloud Cyber Security, Computer Cyber Security|1 Comment

Five Cheap Data Loss Prevention Tools

Companies that need to comply with privacy laws like HIPAA, PCI, GLBA, etc. need to worry about data loss prevention tools. “Data loss prevention” typically refers to preventing employees from deliberately stealing or accidentally leaking sensitive data. The typical stack to data loss prevention tools include: Blocking or monitoring USB drives Blocking or monitoring CD/DVD burners [...]

What is WannaCry and 6 Ways to Protect Your Business from Ransomware

WannaCry ransomware infected hundreds of thousands of computers in May 2017. WannaCry infects a computer, encrypts files and demands payment to decrypt the files. Although this article was first published in 2017, the information about ransomware is still relevant today. WannaCry variants are sure to exist and may unfortunately impact you or your business [...]

By |2018-10-17T19:19:44+00:00October 1st, 2018|Computer Cyber Security, HIPAA|0 Comments

13 Fantastic Resources for Writing an Information Security Policy

So, you need to write an information security policy. And you’re totally overwhelmed. Where do you start? What do you need? What should it entail? You’re not alone. These are questions that we get a lot. It’s totally understandable. Planning, writing, and implementing a security policy can be seriously intimidating. If it’s poorly written or [...]

By |2018-10-17T19:34:27+00:00October 1st, 2018|Computer Cyber Security, HIPAA|0 Comments

5 Free Cyber Security Tips for Windows Users

If you’re a Windows user, here are five free things you should do right now. These will help you with your HIPAA compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use BitLocker, Microsoft’s built-in hard drive encryption utility. You can get instructions here: https://support.microsoft.com/en-us/instantanswers/e7d75dd2-29c2-16ac-f03d-20cfdf54202f/turn-on-device-encryption 2) Take a screenshot to prove your laptop [...]

By |2018-10-17T19:25:23+00:00September 30th, 2018|Computer Cyber Security|2 Comments

5 Free Cyber Security Tips for Mac Users

If you’re a Mac user, here are five free things you should do right now. These will help you with your HIPAA compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use FileVault, Apple’s built-in hard drive encryption utility. You can get instructions here: https://support.apple.com/en-us/HT204837 2) Take a screenshot to prove [...]

By |2018-12-04T19:57:34+00:00September 29th, 2018|Computer Cyber Security|1 Comment