Password Hygiene Best Practices

Password Hygiene Best Practices According to a report by Verizon, 80% of data breaches are caused by weak or stolen passwords. In addition, the report found that 60% of users reuse the same password across multiple accounts, making it easier for hackers to access multiple accounts with a single stolen password. Maintaining good password hygiene is essential to protect against …

Password Management Tools: An overview

Password Management Tools: An overview Effective password management is an essential aspect of cybersecurity. With the increasing number of online accounts and services, remembering all those passwords can be a daunting task. Password management tools provide an effective solution to this problem. This blog discusses the benefits of using password management tools and some password management best practices to be …

SD WAN – What’s up with that?

SD WAN – What’s up with that? So what is this SD-WAN that you have been hearing about? SD-WAN, the acronym for Software Defined Wide Area Network is a new take on the traditional Wide Area Network (WAN). A standard WAN’s goal was to connect users at a branch to a main campus or central office. A WAN is fundamentally …

Good Fences Make for Secure Data

Good Fences Make for Secure Data Investing in firewalls, anti-malware and data encryption software Firewalls and anti-malware tools can help you by keeping unwanted actors out of your IT network. These tools work by restricting access to only pre authorized users and these are primarily defensive measures. Data encryption software, on the other hand, is more proactive and works to …

Good Fences Make for Secure Data

Good Fences Make for Secure Data Investing in firewalls, anti-malware and data encryption software Firewalls and anti-malware tools can help you by keeping unwanted actors out of your IT network. These tools work by restricting access to only pre authorized users and these are primarily defensive measures. Data encryption software, on the other hand, is more proactive and works to …

SMB and Some Basic Employee Security Issues

SMB and Some Basic Employee Security Issues Training teams Your employees are your first line of defense. Training is a basic requirement and should be conducted for every employee. This necessitates involving Human Resources so that businesses incorporate cyber security training from the first day of onboarding. must train their employees on cybersecurity best practices and also constantly update them …

Why Managed Service may be the way to go for your data security

Why Managed Service may be the way to go for your data security Since effective cybersecurity should be a proactive effort, not reactive, this means that SMBs tend to overlook the entire issue as something that can be pushed forward into the future. One way to get around this challenge is to have a service level agreement with an MSP. …

Why Cybersecurity shouldn’t be taken lightly

Why Cybersecurity shouldn’t be taken lightly Let’s start with a “fun fact”: In 1981, the first cybercriminal was convicted of hacking into the AT&T network and altering its internal clock so it charged off-hour rates at peak times. So, it turns out that cybercrime is not all that new. But it stays new in the sense that it is constantly …

What should your privacy policy cover?

What should your privacy policy cover? As a business, you deal with a lot of personally identifiable information on a daily basis. It can come from anybody who interacts with your business. It could be your clients, your vendors, employees, etc. You need to have a privacy policy declaring how you, as a business entity, will be using that data. …

You can lose more in a cyber attack than you can imagine

You can lose more in a cyber attack than you can imagine One of the errors many smaller firms make–and some larger ones–is that they really don’t understand the broad-reaching effects of a cyber attack. If someone breaks into your home and steals a laptop, you may think “ well, insurance will pay for the laptop and the broken lock, …