Six Similarities Between GDPR & US Regulatory Requirements

As companies collect and store more and more personal information, they face data privacy risks on many fronts. Increasingly, they are being held accountable for protecting their customers’ digital privacy. New regulations, led by Europe’s General Data Protection Regulation (GDPR) in 2018, are quickly becoming normative in countries around the world. In total, 58% of all countries Read more about Six Similarities Between GDPR & US Regulatory Requirements[…]

You’ve Been Breached: Now What?

It can happen to anyone – you’ve taken steps to limit your exposure to a cyber incident. You’ve purchased and implemented top-of-the-line IT solutions. You’ve carefully thought about security best practices and strived to adhere to them. But somehow, you’ve just become the latest victim of a data breach. It might have been discretely packaged Read more about You’ve Been Breached: Now What?[…]

How to Spot a Phishing Attempt

Phishing is one of the most common, yet dangerous methods of cybercrime. It utilizes deceptive messages to trick victims into clicking untrustworthy links, downloading malicious attachments, or divulging sensitive information. Despite cybersecurity experts’ warnings over the years, it seems that internet users still consistently fall prey to these simple but effective attacks. According to Verizon’s 2019 Read more about How to Spot a Phishing Attempt[…]

The NY SHIELD Act is Almost Here: How to Stay Compliant

Data privacy regulations are quickly becoming par for the course in countries around the world, each one bringing new, nuanced responsibilities for companies to follow. While Europe’s expansive General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) have made most of the headlines, we are just months away from the latest privacy regulation, New Read more about The NY SHIELD Act is Almost Here: How to Stay Compliant[…]

Top 5 Simple Tips: on Preventing Viruses, Malwares, and Security Breaches

In the previous blog post, we talked about our first speaking gig of 2018, on Cybersecurity. We talked about the importance of being very aware of the dangers of Viruses, Malwares, and Security Breaches. Here is the link to this post. With that said, 95% of breaches are caused by human error and 55% of Read more about Top 5 Simple Tips: on Preventing Viruses, Malwares, and Security Breaches[…]

First Speaking Gig of the Year – A Talk on Cybersecurity

As we get closer to 2020, we start entering the deep waters of immersive technology that can be very exciting but also worrisome. It is nice to have online banking, buy clothes from an online website, store our private photos on the cloud (instead of a physical drive that could be destroyed in a fire), and Read more about First Speaking Gig of the Year – A Talk on Cybersecurity[…]

Know your terminology

We constantly come across a fair number of security related articles talking about security flaws, worms, viruses, Trojans and all manner of nasty sounding programs. With a large selection of malicious software out there, it can be tough to tell the difference between a virus and worm. Here’s an overview of the most commonly used terms Read more about Know your terminology[…]

5 Simple Steps You Can Take To Secure Your Small Business Network

Secure your hardware Securing your hardware is an often overlooked and simple step you can take to secure your network. The best firewalls and anti-virus systems are rendered useless if burglars steal your equipment, servers, laptops, and mobile phones. Lock your servers and related equipment behind a locked door and secure them with server racks. Read more about 5 Simple Steps You Can Take To Secure Your Small Business Network[…]

Crypto!

CryptoWall Viruses CryptoWall viruses such as CryptoLocker, AlphaCrypt and TeslaCrypt to name a few are ransomware trojans that encrypt any file that it has access to your on machine, delete the original, and then demand money to restore your data. What this means is that not only will it delete your files from your computer Read more about Crypto![…]