Home > Tag Archives: Protection

Tag Archives: Protection

Are You Prepared for a Disaster?

What if you lost your entire IT infrastructure in a matter of hours, would your business survive? Disaster recovery planning is essential to continue business operations after disasters occur. This could be anything from a prolonged power outage to a total infrastructure loss caused by catastrophic events. The goal of disaster recovery is to limit the effects of a disaster and take the necessary steps to ensure that the resources, personnel, and business processes are able to continue operation after ... Read More »

Phishers and Scammers are Getting Smarter…Are You?

Most of us have heard of the term phishing and have probably been attacked by it more than once. Phishing is attempting to acquire information from users while posing as a trustworthy individual in an electronic communication.  “Phishing” generally refers to attacks in your email inbox, but there are three others to know of: vishing, smishing, and whaling. “Vishing” is a phishing attack on your VoIP (voice over IP) phone.  If you don’t have a VoIP phone then you are ... Read More »

Where Is Your Laptop?

Laptop theft is a common practice. Every day laptops disappear from college libraries, car back seats, coffee shop tables, hotel lobbies and airport waiting areas. In the past, laptops were valuable for their hardware, once stolen they were resold quickly for strictly their monetary value. Today that’s not the case. Your data is the target! There’s probably something on your laptop that you don’t want the whole world to see. It could be proprietary information, documents containing personally identifiable information ... Read More »

External Penetration Testing – Are Your Internet Facing Systems Protected?

The world of hacking seems like a mysterious place; we seem to only occasionally see it, either on the news or in a movie.  So really, what are the chances of cyber-attack happening to your company?  Think it’s minimal?  Maybe…but can you risk it?  There is currently no federal mandate requiring corporations to disclose cyber-attacks, so why worry?  Here’s why: if anyone finds out, it only takes one attack to destroy a company’s reputation (and, in the process, their bottom ... Read More »

Protect Your Passwords

Protect Your Passwords! – Believe it or not everyone has passwords and uses them more often than you think. Your check cards are secured by a password (a.k.a. pin), your cellphone voicemail has a password, and your home security alarm and possibly even your garage door have passwords. But how good is your password if you don’t protect it? As a security expert I’ve performed hundreds of IT security assessments and have seen the most secure passwords left unprotected. Here ... Read More »