Posts Categorized: Cyber Security

Lessons in Data security from recent hacks to Zoom 

While it seems like everyone was a fast and optimistic adopter of the video conferencing platform Zoom in response to the sudden shift to working from home, some concerning data security incidents have arisen from the pervasive use of the platform. While Zoom as a platform was easy to use, and a free resource suddenly… Read More »

Is remote access and VPN a secure strategy for remote work in 2020?

Remote work has become a business necessity in the era of COVID-19. Many businesses had to shift their workforce strategy from all or mostly office-based to at least partially remote to help enforce social distancing requirements of the majority of the United States in 2020. But that shift happened so fast that it’s hard to… Read More »

The importance of a documented process on what employees CAN and CANNOT install on a work computer

Third-party software can be a real problem for employers concerned about data security. It’s important to understand what’s at stake and take action to protect not just your personal data, but also your corporate data security. You wouldn’t want a stranger to walk into your office and rifle through your files. That’s why you have… Read More »

Should you encourage your employees to avoid sharing sensitive data in Slack or other communication platforms?

As the modern workforce has moved to remote work en mass in the past several months, communication platforms such as Slack and Zoom have become hugely instrumental. But with the incorporation of third-party apps and programs, not directly managed by a company’s security department, comes risk to loss or disclosure of sensitive data. It’s important to recognize the risks inherent with using communication… Read More »

The Security Concerns with Self-Hosted Servers for Businesses

There are any number of security concerns businesses need to be aware of when it comes to data storage. Whether you are committed to on-site, off-site, or digital records management, security should always be front and center to your decision making. Self-hosted servers can be a shocking vulnerability for businesses, even those with dedicated IT… Read More »

Is Google Drive a Secure Solution for Small Businesses?

As more companies move their data to the cloud, solutions such as Google Drive seem more and more appealing. But with the increased use of the cloud, it is easy to understand how and why more hacking attempts will take place online. In a way, the cloud can be low hanging fruit for a savvy… Read More »

The Importance of Developing Approved Products and Tools Your Team Can Use to Improve Security Measures

Maintaining clear and organized records is an important part of doing business. But there inevitably comes a time when keeping those records becomes unnecessary or even a risk to your business. Disposing of old and unnecessary physical documents can be quite a process if done properly. Your data security depends on establishing reliable processes and… Read More »

Remaining Vigilant: A look at a few phishing scams present during the COVID-19 pandemic

Phishing scams are experiencing an uptick in popularity as many businesses move quickly into a work from home model. Phishing can sabotage a user’s personal information and lead to multiple problems in safeguarding confidential information. With these scams on the rise as more people turn to the internet for business purposes as well as personal… Read More »

How Social Media Leaves Your Data Vulnerable

Social media has quickly become a ubiquitous digital experience. Almost everyone is on social media in one form or another these days. But just because it’s so prevalent doesn’t mean that every social media app is safe from a data security perspective. In fact, your mobile apps might be oversharing on behalf of you and… Read More »

Top Three Mobile Security Threats for 2020

Security threats come from many different sources, not the least of which may be in your pocket right now. Mobile security has traditionally been an all too often overlooked arena. But as we move into a new decade, it’s high time we all took a good hard look at our mobile devices as the potential… Read More »