Distributed denial of service attacks grew into a huge threat in 2016. Two massive DDoS attacks made the news within a month of each other. On September 20, an attack hit the website of security expert Brian Krebs. At its peak, it flooded the site at 620 Gbps. On...
Click Ready
Ransomware as a Service: What You Needto Know
The rising ransomware threat causes many business executives to sweat when they think of it. Ransomware as a service, or ransomware for hire, is even worse. It's bad enough that hackers can use it. Selling ransomware, however, means that anyone can become a cyber...
Understanding Ransomware as part of the Cyber Threat Landscape
For companies that rely on data to function, ransomware attacks are among the most devastating--especially if the company doesn't have a solid backup system in place that will enable them to restore as much of that data as possible. Being ready for a ransomware attack...
Signs of a Hack and How to Respond
You're no stranger to the dangers out there, but if you're like me you want a reference guide of the signs to look for to determine if you've been hacked, and how to respond if it happens to you or your business...well lucky you! You've stumbled on the right post....
Roles to Assign in Your Disaster Recovery Plan
Have you thought about who should be involved in your disaster recovery plan now that you're finally getting ready after so many years? When you have a large company, it's not easy to coordinate every department without creating confusion. As a result, you've perhaps...
The Importance of Redundancy in your Business Continuity Plan
We usually want to avoid redundancy. It's saying the same thing over and over. It's repetitious and repetitive. But when you need reliability and safety, redundancy is exactly what you're after since it avoids single points of failure. When you give a neighbor a spare...
Small Businesses Open The Doors for a Larger Data Breach.
We are all connected. More than ever before, with IoT, smartphones, and all forms of internet communication. What infects one device can easily spread to all. Connectivity can be good, but it also opens up risks and raises cyber security concerns. No Corporation Is an...
Why Avoid Cyber Attacks: What’s the Worst That Can Happen?
If you are like most business owners, this is one of your first thoughts when it comes to dealing with cyber attacks: what's the worst that can happen? Remember, hackers are cyber criminals; sophisticated cyber criminals. They use sophisticated hardware and software...
Small Businesses Aren’t Too Small For Cyber crime: Three Cautionary Tales
Computer security is often one of the last things on the mind of small business owners, especially those who focus on a local market and have less than 10 employees. When you're struggling just to get local attention, why would international cybercriminals even know...
Securing Sensitive Business Information: How to Protect Unstructured Data
Busy executives in companies of every size have enough balls to juggle in the current global and highly competitive marketplace. Isn’t it the IT team’s task to focus on securing company data? It turns out that in today’s business environment, your enterprise’s data is...