DATA LOSS PREVENTION PART 3


  In this final piece about Data Loss Prevention, we examine some important characteristics of DLP Software Packages, and some of the leading ones that you should consider acquiring for your business or corporation.   DLP software packages come in three main categories:   Network based solutions These are typically installed at the endpoints of […]

Read More…


5 APPS FOR IMPROVING YOUR PHONE’S DATA SECURITY


  Ascend Education recently released part three of its series on the top smartphone security threats today. The article tackles cyber threats like screen lockers and ransomware. Considering that the topic is already in its third edition, it’s clear that our data can be compromised in creative and unexpected ways via our phones. It’s important […]

Read More…


HOW TO RECOVER DATA FROM A DEAD LAPTOP


Using the Cloud for backing up data has many advantages over using an On-Premises solution (also known as “On-Prem”). Backing up your data on the Cloud has many benefits:   No need to purchase an existing infrastructure High levels of scalability Greater levels of protection Tremendous cost savings and No more tape backups. After having […]

Read More…


AN FBI WARNING ON ATM CASHOUT ATTACK


Brian Krebs, on his blog Krebs on Security,  shares a warning to all consumers; the FBI has warned banks of an “unlimited operation” run by cyber criminals. Known as an “ATM cash-out,” it is a global and highly choreographed fraud scheme which uses cloned cards at ATMs. Supposedly, these cybercriminals can get ATM machines to […]

Read More…


DATA LOSS PREVENTION PART 2


  Our last post examined the important concepts of what Data Loss Prevention (DLP) is.  In this post, we now examine the required controls that are needed to safeguard these datasets, as well as the important features you need to look out for as you pick a particular DLP solution for your business.   The […]

Read More…


AVOIDING CARD SKIMMERS AT THE PUMP


  Many of us have heard of fuel dispensers being a target for card-skimming devices.  Brian Krebs wrote a post on his blog “Krebs on Security” on how to avoid these card skimmers, and he uses the San Antonio Police Department as a source for tips. Some of these tips include using only new fuel […]

Read More…


SEVEN STEPS TO PROTECT YOUR SMARTPHONE


Our previous blog posts have examined the various cyber-based threats posed to Smartphones.  In this post, we examine seven steps that you can take to help mitigate those risks:   1. Use Two Factor Authentication:   This is also known as “2FA” for short. Two factor Authentication means that you are using two layers of […]

Read More…


5 Tips to Avoiding Ransomware


A recent blog post reviewed what Ransomware is, how it is deployed, and the types of attacks that can occur.  Essentially, it is a type of cyber-attack that can lock up your computer screen, your mission critical files, and the data that your company depends on daily.   The only way you can ever hope […]

Read More…


The Top 5 IT Certifications of 2018


A couple of weeks ago, we posted a blog that examined the benefits of making New Year’s Resolutions to further advance your career with IT Certifications. If you have taken our advice, the next step is deciding which specific certifications to get.  This can be a daunting task, as there are so many to choose […]

Read More…