Protecting Your Business Mac Computer from Cyber Infections: Tips to Know

Protecting Your Business Mac Computer from Cyber Infections: Tips to Know

Tips to Protect Your Mac Computer from Cyber Threats Mac computers have an excellent reputation when it comes to cybersecurity, but they can still be targeted. Find out about protecting your Mac from threats. Malware, ransomware, phishing—the cyber threats on the internet abound, and these threats are generating an astounding cost to the people who…

What Are Your Company’s Responsibilities Following a Data Breach?

What Are Your Company’s Responsibilities Following a Data Breach?

Learn from Marriott’s Example: Notification Responsibilities After a Data Breach Most states, the District of Columbia, the Virgin Islands and Puerto Rico have passed legislation regarding notification of security breaches. Know the laws in your state.   To answer this question, let’s start with the example experienced by Marriot International recently when a breach exposed the…

Want To Drastically Enhance Your Small Business Cybersecurity?

Want To Drastically Enhance Your Small Business Cybersecurity?

No matter how secure you may be right now, you could always be doing more. Have you double-checked your cybersecurity lately? Review the best practices below to strengthen your small business cybersecurity. When everything is going well, the last thing you want to do is think about what will happen when something goes wrong. It’s…

How Can You Celebrate October National Cybersecurity Awareness Month?

How Can You Celebrate October National Cybersecurity Awareness Month?

Celebrate October National Cybersecurity Awareness Month October is National Cybersecurity Awareness Month. It provides a framework for companies, individuals, and organizations to examine past and current cyber threats to reduce their risks.     October is National Cybersecurity Awareness Month. Started by the Department of Homeland Security, it provides a framework for companies, individuals, and organizations…

Locking Down Endpoint Security

Locking Down Endpoint Security

Mobile Devices on Your Network? Use Endpoint Security Software Mobile devices used for telecommuting can compromise your network. To keep your sensitive data safe, use a firewall, antivirus and endpoint security software.   In today’s mobile environment, companies that offer employees the opportunity to telecommute often gain the upper hand. But allowing workers to access…

Factsheet on Mobile Applications and Cybersecurity

Factsheet on Mobile Applications and Cybersecurity

FaceApp, the AI-powered photo editing app, went viral for quite a while until various experts expressed concerns about cybersecurity. In light of these concerns, we’ve put together a quick factsheet on mobile applications and cybersecurity. Here are a few tried and true ways to protect yourself: Download applications from trusted sources only and do your…

Google Docs Being Used to Attack Users With TrickBot Banking Trojan

Google Docs Being Used to Attack Users With TrickBot Banking Trojan

Watch Your Google Docs: Program Being Used to Disseminate TrickBot Malware Beware of any Google Doc emails you receive. Cyber attackers are using the word processing program for a phishing scam that disseminates TrickBot malware.   Take extra caution if you receive a Google Docs document sharing email in the near future — it may be…

New Phishing Threat Presents Security Challenge

New Phishing Threat Presents Security Challenge

Phishing Attacks Target OAuth Credentials to Gain System Access Discover how an increasingly popular authentication process, OAuth, can be exploited by hackers and wreak havoc on applications and access sensitive data. What Is OAuth? OAuth is a widely used framework that allows applications to share access to assets. It lets unrelated services and servers to…