Posts Categorized: Cyber Security

What constitutes a data breach?

A pretty common question we receive is what constitutes a data breach? The answer may surprise you because it’s actually a lot more common than you would think. A data breach is the intentional or unintentional release of secure or private information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak, information… Read More »

What are some of the largest data breaches in history?

It is more important than ever to secure and protect your critical files and sensitive data. It is surprising to see how many companies regularly make simple mistakes that result in expensive breaches and loss of data. This is often due to common assumptions that can have a significant impact on your organization’s security. Many… Read More »

The top virus protection services to help you keep employee safe

The companies with solid data security are the ones lined up for success in the modern age. Those who can make use of their data and protect it from hackers at the same time are the ones who will be most likely to have a positive impact is under threat in a big way. Whether… Read More »

Protecting Your Company: The best steps you can take this fall 

Data security is a concern for businesses of any size or within any industry. The risk you expose your staff, your clients and your business by not building a secure data environment is real. The coming fall is the perfect time to take a fresh look at your policies around data management, both on the… Read More »

Lessons in Data security from recent hacks to Zoom 

While it seems like everyone was a fast and optimistic adopter of the video conferencing platform Zoom in response to the sudden shift to working from home, some concerning data security incidents have arisen from the pervasive use of the platform. While Zoom as a platform was easy to use, and a free resource suddenly… Read More »

Is remote access and VPN a secure strategy for remote work in 2020?

Remote work has become a business necessity in the era of COVID-19. Many businesses had to shift their workforce strategy from all or mostly office-based to at least partially remote to help enforce social distancing requirements of the majority of the United States in 2020. But that shift happened so fast that it’s hard to… Read More »

The importance of a documented process on what employees CAN and CANNOT install on a work computer

Third-party software can be a real problem for employers concerned about data security. It’s important to understand what’s at stake and take action to protect not just your personal data, but also your corporate data security. You wouldn’t want a stranger to walk into your office and rifle through your files. That’s why you have… Read More »

Should you encourage your employees to avoid sharing sensitive data in Slack or other communication platforms?

As the modern workforce has moved to remote work en mass in the past several months, communication platforms such as Slack and Zoom have become hugely instrumental. But with the incorporation of third-party apps and programs, not directly managed by a company’s security department, comes risk to loss or disclosure of sensitive data. It’s important to recognize the risks inherent with using communication… Read More »

The Security Concerns with Self-Hosted Servers for Businesses

There are any number of security concerns businesses need to be aware of when it comes to data storage. Whether you are committed to on-site, off-site, or digital records management, security should always be front and center to your decision making. Self-hosted servers can be a shocking vulnerability for businesses, even those with dedicated IT… Read More »

Is Google Drive a Secure Solution for Small Businesses?

As more companies move their data to the cloud, solutions such as Google Drive seem more and more appealing. But with the increased use of the cloud, it is easy to understand how and why more hacking attempts will take place online. In a way, the cloud can be low hanging fruit for a savvy… Read More »