Let there be hope...
Life has changed there is no doubt and we wanted to reach out to see how you are doing.
As we go through this interesting time, we are trying to look at this as an opportunity to focus on our family and on friends like you. Let us use this extra time to catch up and talk more. Let us cook food that is not fast, but interesting and satisfying. Let us learn to enjoy a time to try new things. Let us find ways to enjoy time at home!
Computer Security
If my client base is any experience, anyone can be a victim of a Ransomware, Malware or Virus attack.
What can you do about it?
I conduct audits of your entire computer infrastructure and apply best practice solutions to plug the security holes on your computers, Smartphones and networks.
Now offering consultations to give you the best protection possible:
Jack of All Trades, Master of Many
Jack of All Trades, and Master of Many
We provide technical support for:
Homes and small businesses
Windows and the Mac OS platform
iPhones and Android Smartphones
Wireless and wired networks
New device setup
Old device upgrade or repair
One-on-one training
Remote assistance
How To Stop Malware
Home » Archives for August 2019
Monday, August 12, 2019
A Quick and Dirty Guide to RAM: What You Need to Know by Gavin Phillips
The biggest security breaches of 2019, so far By Janet Perez, Komando.com
Retailers hit by data breaches
Familiar social media site continues data breach streak
Hackers zero in on banking, financial companies
One medical agency hacked, compromising three companies
Government breach re-victimized victims
Data company left database unprotected
Hackers build mystery databases on the dark web
If data is stolen from a breached database, you often can find it for sale on the numerous marketplaces that circulate on the dark web. Sometimes the data can be pinpointed to a specific breach, but every once in awhile hackers will create collections from a variety of breaches.
How to avoid and what to do if you're data is hacked
Check for these browser extensions that secretly collect and sell your data
Major Intel security flaw puts PCs at risk - exposing passwords, conversations and more By James Gelinas, Komando.com
A major hole in a popular product
What can be done about the "SWAPGS Attack?"
Intel releases important security patches for Core processors
Why hackers target small businesses (and what to do to stay safe) By Vince Pontorno, Komando.com
Why are hackers targeting small businesses?
How can small businesses defend themselves?
- Be aware of internal threats that may exist within your business - It's been reported that 31.5% of attacks are initiated by company insiders and employees. For example, the suspect in the recent Capital One hack turned out to be a former Amazon Web Service employee, who accessed the bank's customer files which were stored on Amazon's cloud server. By beefing up internal protocols, increasing authorization requirements and keeping a close eye on any/every employee with access to secured data, potential leaks and hacks should be stopped before they even have a chance to start.
- Invest in more secure forms of communication - This may come as a surprise, but faxing is actually the most secure form of communication in the business world. Furthermore, if your staff uses mobile devices for work or accessing accounts, you need restrictions on the information certain devices can access. There should also be strict rules on whether devices can be taken home as well as clear protocols for when/how IT can wipe a device clean.
- Designate a point person to oversee all cybersecurity efforts - Even if employees are wearing multiple hats and handling a variety of responsibilities, someone trustworthy should have their focus on security. This person doesn't have to necessarily handle all the work, but they need to find the right services or professionals who can implement the proper updates and upgrades.
- Properly train employees - Consistently provide ongoing training to employees on appropriate security practices and limit access to sensitive data to only specific employees who need it perform their duties. A majority of data breaches in both big and small businesses still occur when employees unwittingly download malicious materials disguised as emails that can pass for legitimate. Phishing scams are a prime example. So, it's worth it to educate employees on how to distinguish between real and fake downloadable content in order to avoid more harmful attacks later on.
- Install anti-virus software/hardware and keep it updated to meet the latest threats - Identity thieves take advantage of the ignorance and the fact that some companies fail or often forget to update their security software consistently and in a timely manner. So, it's important to keep your security protocols current and updated with the latest versions. Installing and testing a proper firewall is strongly recommended as well. Also, before downloading any files, make sure they are scanned for safety to avoid any unnecessary attacks.
- Keep critical data backed up - Once you've confirmed that your system is clear, healthy and you've implemented the proper security protocols, you must consider regularly backing up all of your data as well. This has become a significant step for small businesses due to the increase of attackers using cyber blackmail, or ransomware. Holding a company's valuable info hostage is an easy payday for hackers. However, businesses can take back control of the situation by having a backup plan at the ready. Having data saved across numerous locations, including on a cloud server, ensures businesses can access their data, even after it's been compromised. Kim recommends her trusted sponsor, IDrive for all of your backup needs. With IDrive, you can backup all your PCs, Macs and mobile devices into one account. Save 50% today, when you sign up at IDrive.com and use promo code Kim.