Tag: IT / Cyber Security

Your Source for Business Technology Tips and News

Tag Archive: IT / Cyber Security

By:

Client Spotlight: Net at Work vCTO Teams Up with bfi

As one of the nation’s largest furniture specifiers and distributor, bfi (Business Furniture, Inc), provides consultative services, product solutions and technical assistance for office, healthcare, institutional, and government environments. bfi engaged Net at Work and its Virtual CTO (vCTO) services…

By:

6 Signs It’s Time to Update Your IT infrastructure

No business wants to stagnate. But treat your IT infrastructure like an afterthought and you could be severely limiting your company’s potential. Let aging systems continue operating as is, and they could quickly turn into a business liability. Yet there…

Contact Us

  • This field is for validation purposes and should be left unchanged.

By:

Taking Telework Cybersecurity to New Levels: How to Secure Every Device, Everywhere

Amid the global increase in remote work driven by the Coronavirus pandemic users are increasingly susceptible to attacks through malware, phishing, and targeted threats. Perimeter security deployed at the office is no longer enough to adequately defend your employees in…

By:

Protecting Business Continuity in the Event of a Coronavirus-based Cyberattack

The unprecedented global pandemic COVID-19 is impacting businesses in ways never before seen. In a recent CNBC survey, more than one-third of senior technology executives said cybersecurity risks have increased as a majority of their employees work from home, and…

By:

COVID-19 Related Cybercrime and PCI Compliance: The Importance of Securing Credit Card Data

COVID-19 (Coronavirus) has caused all of us to rethink and revise the way we do business and the way we live in general. In the new environment where a majority of the workforce is working remotely, and businesses and consumers…

By:

Protecting Against the Emerging COVID-19 Phishing Email Threats

As a result of COVID-19 (Coronavirus), Cybercriminals are taking advantage of the widespread discussion of the outbreak in emails and across the web. There continues to be a steady increase in the number of COVID-19-related spear-phishing attacks, up 667% since the…

By:

New York SHIELD Act: New Cybersecurity Compliance – What You Need to Know

On March 21, 2020 New York State enacted  the SHIELD Act (Stop Hacks and Improve Electronic Data Security), which expands New York State’s data breach notification law and imposes stricter data security requirements on businesses that hold the private information…

By:

Top IoT Trends to Look for in 2020

As the internet of things (IoT) revolution gains momentum, and our homes, devices, and workplaces become increasingly interconnected, what can we expect from the market in 2020? One certainty is that the potential is there for small and medium businesses…

By:

8 Tips for Detecting a Phishing Email

As email phishing tactics continue to increase in sophistication, fraudulent emails are looking more and more legitimate making it difficult for the average user to tell whether an email message is fraudulent or real. In this post we offer tips…

By:

Email Security Strategy: Why Automated Security Awareness Training Is Critical

Computer-based training (CBT) for information security awareness is increasingly more important in the fight against today’s explosion of costly phishing and other social-engineering attacks, and while we all know that teaching folks how to spot and avoid malicious email is…

By:

5 Steps to Get Started Protecting Your Data

More than 1.9 billion records containing personal and other sensitive data were compromised between January 2017 and March 2019. That’s according to the latest EY Global Information Security Survey, and a sobering reminder why businesses of all sizes must act…

By:

Cybersecurity Best Practices: Strategies for IT, Legal & Insurance

Cyberattacks are not only on the rise, they hit businesses every day. The broadness of the scope of illegal access and the sophistication and diversity of threats aimed at unauthorized information access have skyrocketed. Phishing, Malware, Ransomware, Password Breaches, Denial…

By:

IT Security Best Practices: Quick Tips to Help Secure Your Network

Cyberattacks are on the rise. Phishing, Malware, Ransomware, Password Breaches & Denial of Service Attacks have changed in design and grown in complexity, so there’s no better time to refresh on some basic best practices to secure your network. Password…

By:

Stop Ransomware in its Tracks

“Oops, your files have been encrypted!” It’s a message nobody ever wants to see, yet it was what greeted workers in the UK’s National Health Service (NHS) in May 2017. This was the WannaCry (a.k.a. WannaCrypt or WannaCryptor 2.0) malware….

WordPress Image Lightbox Plugin
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]