White House Warns Companies to Act Now on Ransomware and Cyberattack Protections
The White House has sent out recommendations to the private sector over how to protect themselves from cyber intrusions after a series of ransomware attacks left companies and government agencies vulnerable. The White House memo lists the following five best…
Lost, Stolen or Hacked: Seven Steps to Curb Device Anxiety
Our devices house our entire lives. From finances to family photos they’re the keepers of our past, present and future. Even the thought of someone gaining unauthorized access is enough to set off alarm bells. When it comes to protecting…
Contact Us
Client Spotlight: Net at Work vCTO Teams Up with bfi
As one of the nation’s largest furniture specifiers and distributor, bfi (Business Furniture, Inc), provides consultative services, product solutions and technical assistance for office, healthcare, institutional, and government environments. bfi engaged Net at Work and its Virtual CTO (vCTO) services…
6 Signs It’s Time to Update Your IT infrastructure
No business wants to stagnate. But treat your IT infrastructure like an afterthought and you could be severely limiting your company’s potential. Let aging systems continue operating as is, and they could quickly turn into a business liability. Yet there…
Taking Telework Cybersecurity to New Levels: How to Secure Every Device, Everywhere
Amid the global increase in remote work driven by the Coronavirus pandemic users are increasingly susceptible to attacks through malware, phishing, and targeted threats. Perimeter security deployed at the office is no longer enough to adequately defend your employees in…
Protecting Business Continuity in the Event of a Coronavirus-based Cyberattack
The unprecedented global pandemic COVID-19 is impacting businesses in ways never before seen. In a recent CNBC survey, more than one-third of senior technology executives said cybersecurity risks have increased as a majority of their employees work from home, and…
COVID-19 Related Cybercrime and PCI Compliance: The Importance of Securing Credit Card Data
COVID-19 (Coronavirus) has caused all of us to rethink and revise the way we do business and the way we live in general. In the new environment where a majority of the workforce is working remotely, and businesses and consumers…
Protecting Against the Emerging COVID-19 Phishing Email Threats
As a result of COVID-19 (Coronavirus), Cybercriminals are taking advantage of the widespread discussion of the outbreak in emails and across the web. There continues to be a steady increase in the number of COVID-19-related spear-phishing attacks, up 667% since the…
New York SHIELD Act: New Cybersecurity Compliance – What You Need to Know
On March 21, 2020 New York State enacted the SHIELD Act (Stop Hacks and Improve Electronic Data Security), which expands New York State’s data breach notification law and imposes stricter data security requirements on businesses that hold the private information…
Top IoT Trends to Look for in 2020
As the internet of things (IoT) revolution gains momentum, and our homes, devices, and workplaces become increasingly interconnected, what can we expect from the market in 2020? One certainty is that the potential is there for small and medium businesses…
8 Tips for Detecting a Phishing Email
As email phishing tactics continue to increase in sophistication, fraudulent emails are looking more and more legitimate making it difficult for the average user to tell whether an email message is fraudulent or real. In this post we offer tips…
Email Security Strategy: Why Automated Security Awareness Training Is Critical
Computer-based training (CBT) for information security awareness is increasingly more important in the fight against today’s explosion of costly phishing and other social-engineering attacks, and while we all know that teaching folks how to spot and avoid malicious email is…
5 Steps to Get Started Protecting Your Data
More than 1.9 billion records containing personal and other sensitive data were compromised between January 2017 and March 2019. That’s according to the latest EY Global Information Security Survey, and a sobering reminder why businesses of all sizes must act…
Cybersecurity Best Practices: Strategies for IT, Legal & Insurance
Cyberattacks are not only on the rise, they hit businesses every day. The broadness of the scope of illegal access and the sophistication and diversity of threats aimed at unauthorized information access have skyrocketed. Phishing, Malware, Ransomware, Password Breaches, Denial…