In late July 2020, technology giant Garmin fell victim to a ransomware attack that halted operations across the board. Encrypted company data meant customers could not access the information synced from their devices. Aviation and GPS communications were unavailable. Even customer support was inaccessible. Garmin ultimately opted to pay the multi-million-dollar ransom to regain access. Services were restored but it left customers
“Well, there’s a sign upon your door Gone phishin’ You ain’t workin’ anymore…” (with apologies to Bing and Satchmo) When it comes to compromising data security, cybercriminals have a vast selection of tools at their disposal. Their most effective tool, however, is the one that exploits your weakest link – your employees. Phishing attacks account for up to 90% of data breaches,
Collecting customer information can make you a target for cyber attacks. As hackers get more sophisticated, you must do the same to keep your business safe.
Business wireless networks require more security than the average home network. If your business uses WiFi, you may be more vulnerable than you think.
While companies still need to protect their physical assets, they must also consider protecting the very lifeblood of their business: data. Fortunately, today’s business security is better thanks to technology.
Spectre and Meltdown belong to a category of vulnerabilities called “chip hacks.” These affect the processors of computers, phones, and tablets. Both hacks rely on the manipulation of processor operations in order to retrieve sensitive data. Spectre exploits a design flaw by tricking programs to perform unnecessary actions, potentially exposing confidential data. Meanwhile, Meltdown grabs information from the processor that ordinarily would not be accessible.
Please note that both of these hacks would require an actual malicious attempt by a hacker. Without the manipulation of the processor’s operations, private information, such as passwords, is relatively safe. However, if we’ve learned anything about security flaws, it’s that someone, somewhere, will make an attempt before a patch can be applied. The potential for your passwords to be exposed is real.
When your website is down, it’s always a surprise. What’s worse, downtime can be expensive in terms of lost productivity, lost revenue, cost to recover, and cost of reputation. Some companies measure the time lost per second when a site goes down because they have so much traffic. However, there are a few things you can do to get past the panic and into solutions to get your site back online.
While you can still use your computer with the outdated operating system, you will be susceptible to malware triggered by hackers taking advantage of weak or unpatched code.
Before the global attack was stopped, it spread around the world, affecting computers in 150 countries – including computers used in healthcare systems, utilities, and government. On Monday, May 15th, as the world went back to work, the attack picked up speed again.
Most of these scams instruct you to “like & share” a post in order to enter into a pool of possible winners. Maybe you’ve done it yourself, thinking, “what could it hurt?” Facebook giveaway scams exist for one reason: to get something from you. If you’re overly fond of your personal information (and you should be), avoid these “like & share” schemes.
An image-based backup preserves a copy of a machine’s operating system, including system state and application configurations, as well as the data associated with that machine. The information captured in this copy is saved as a single file known as an image. Each image represents a single point in time, which allows a restore of a specific file at a specific point if necessary.
Data security is becoming more important as business data is being collected everywhere. Globally, we generate 2.5 quintillion bytes of data each day, a figure that will likely grow steadily in the years to come. In fact, the data generated just within the last two years amounts to 90% of the data currently in existence. The rapid pace of data generation requires a business to stay on top of their data protection strategy. Threats to data security seem to lurk at every turn. But what are the biggest threats to a company’s data?
As part of a business continuity plan, a disaster recovery plan is critical to the health of your business. But it’s not enough to merely have a disaster recovery plan – you also need a disaster recovery checklist to make sure that plan is implemented.
Say the word “disaster” and powerful images come to mind – tornadoes, floods, hurricanes, earthquakes, and the like. But there are more common disasters. A vicious bit of malware that gains entrance into company servers. Even a cup of coffee knocked over onto a keyboard can cause significant problems. And yet, most companies are content to build their business disaster recovery plan for the “someday” of a natural disaster, which is statistically less likely to occur.
Email can be a chink in the armor of business data security.Unencrypted email can be intercepted en route between two secure points and viewed by anyone.
An iPhone Virus is a real thing If you have a smartphone, and 64% of Americans do, you have more than just a phone – you have a computer in your pocket. There have been volumes written over the years about viruses and malware that affect computers at every level, but not a lot of ink has been spilled over the subject