An IT Audit is performed by a third party and is an in-depth analysis of a company’s technical environment, including its existing computer applications, hardware infrastructure, IT plan and IT related personnel. The Audit results in a detailed written report and guide that recommend strategic business initiatives pertaining to rightsizing internal and external practices and systems. In a nutshell, the audit will help to uncover areas of concern and will offer solutions to fix these issues.
Just when you think you’ve got a better handle on Cyber Security! Now you can add WI-FI to the list of what makes us vulnerable to cyber-attack. This new attack, dubbed by experts, as “KRACK” is real and you’re going to want to read this! If you’re one of the 6.8 billion people who own a smartphone or one of the 300+ million global WI-FI users then you’re at risk along with the rest of the world!
What is 2FA?
Two Factor Authentication is an additional layer of protection beyond your password. With millions of people online every day, processing millions of transactions, how do you prove your identity to websites? When you’re in front of a bank teller or a bartender, it’s simple! You show them your driver’s license and you attempt to replicate the same smile you made in that photo twenty-five years ago! But how do you suppose you prove who you are to a website today?
October is Cyber Security Awareness Month. I guess "scary" doesn’t just apply to Halloween these days. One of the scariest things this season is knowing how insecure our financial information can be. Recently Equifax revealed that more than 143 million consumer accounts were compromised in a breach and then last week Yahoo announced that every single one of its' user accounts were breached back in 2013. This news isn't easy to swallow because it's serious. Serious threats to personal data are at an all-time high. Everyone, including individuals and businesses of all sizes, needs to remain diligent in their protecting themselves from hackers and privacy breaches.
The Best Defense Against Ransomware Attacks is Knowledge and Then Applying That Knowledge!
The best defense against ransomware attack is knowledge and then of course applying that knowledge. Knowing what you need to do in order to protect yourself is critical to the safety of your business. The recent "wannacry" ransomware attacks provided us with valuable information, which are basically opportunities, to learn or re-learn how to defend and secure our networks. As with most attacks, our attackers leave behind clues in their wake. The Cyber Ransomware Attack labeled “Wannacry” recently took a "second go" at attacking its’ victims.
We depend on many different tools, services and securities in life to help keep us safe. Question is, do we take the proper precautions to make sure they’re working, that they're doing their function? We don’t live in a perfect world and that's exactly why we should be testing our managed security systems often. Last night I decided to test my home security system. I tested the signals within the house and then tested the signal from our home to the monitoring center. Protecting my family is single-handedly the most important thing in the world to me. If you have a home security system, I think that you should think about breaking into your house this weekend (I think you know what I'm saying)
Don’t fall victim to Cybersecurity scams. Be on alert from fraudulent email senders.
Earlier this week I received a spoof email (under most circumstances this wouldn't be weird), however I received the email while writing this article about "email spoofing." Talk about coincidence. Email spoofing is a relatively newer form of spam, it’s a term used to describe fraudulent emails in which the sender’s address and other parts of the email header are altered in some way to appear as though the email originated from a different source.