Being covered for the loss of sensitize, virtual information.

Posts

Workplace Setup

Risk of a Common Password and Ways to Avoid it (Infographic Inside)

Using a common password leaves your organization at risk for cybercriminals to attack your account. Let’s add password protection as a major component in your organization's cybersecurity plan.  The risk of a common password is tremendous,…
Collaborative work at a deskPhoto by Brooke Cagle on Unsplash

Social Engineering: Meaning and Impact

, , , ,
Definition Social Engineering is the means of deception to extract sensitive, personal information that can then be used for further purposes, such as bank fraud, account takeovers, or identity theft. Cyber hackers primarily use social engineering…
hands, cellphone using google to make a search query

The SHIELD Act : How It Affects Your Business In New York

,
Due to the increasing concern about the security of personal information, many states feel the need to implement data and cybersecurity laws to protect private information utilized by these malicious hackers. On July 26th, the governor of New…
Cyber Attack Prevention

Cognizant Gets $400 Million Payout After Cyber Attacks

, , ,
Technology consultant firm Cognizant fell victim to cyber-attacks caused by a ransomware attack last April. The hack disrupted thousands of employees from accessing networks from their home during quarantine. Clients also disallowed Cognizant…
Buying Cyber Insurance

Buying Cyber Insurance Does Not Protect Your Organization From Cybercriminals

,
Buying Cyber Insurance Does Not Protect Your Organization From Hackers   Understand that purchasing Cyber Insurance does not protect your organization from hacking. It simply finances pieces of the loss. A recent report by cybersecurity…
Macbook with codePhoto by Christopher Gower on Unsplash

Conducting An Organization Wide Phishing Test

,
Remote operation of your business means that protections your office building had, your employees' homes may not. Cybercriminals are taking advantage of this situation by phishing out your employees' data. Take the time to educate your employees…
colorful codePhoto by Ilya Pavlov on Unsplash

Business Interruption and Ransomware

, , , ,
Ransomware is a type of malware designed to deny access to a person’s computer unless they pay the hacker ransom. The NY Times reports that these attacks have grown over the past year with a 41 percent increase in 2019. Ransomware attacks…
phishing emails

Phishing Attacks: Know the Signs!

Beware of Phishing!!! Hackers will start with low-level employees first, making their way to executives’ accounts. Hackers are constantly trying to find ways to hack into company accounts. They start off by sending trust-worthy emails…