What You Will Learn in This Episode: What effective cybersecurity looks like for agency operations — and why you should care The risks every business should be aware of (yes, small agencies too) How cybersecurity and compliance are the same, and also very different Why your policies need to match your practices and how to make sure they do How … Read More
Ransomware Won’t Go Away
Ransomware attacks have, over the years, become targeted and expensive. There is an ongoing ransomware epidemic with attacks becoming more targeted. Previously, ransomware strains asked for ransoms of small amounts. Over the years, the ransom demand has exploded to nearly a million dollars. Requested ransom depends on how much data and the crooks perceived ability to extract money from the … Read More
Protecting Your Backups from Virus and Ransomware Attacks
Backups are an important aspect of a recovery plan after a virus and ransomware disaster. When your organization is hit with ransomware, you can use backups to recover the system without much hassle. However, backups are not immune to virus and ransomware attacks. There are advanced forms of ransomware that contain mechanisms intended to encrypt backup stored both in the … Read More
Fix It Before It’s Broken: Three Reasons You Need to Upgrade Your Company Computers
According to research published by Our World in Data, technological advancements have been following an exponential curve for decades. Between innovations in processing, storage capabilities, and security of personal computers (PCs), as well as standard maintenance required to keep devices functional, you should plan to replace company hardware approximately every 4-5 years. Stretching the life of a machine only because … Read More
Top Five Online Scams to Beware of in 2020
2020 has been subject to a myriad of scams that target individuals through different media outlets. Scammers lure victims into fraud by exploiting current events or taking advantage of the fact that people use the internet to job search, look for love, purchase goods, and bank online. Communication Concepts has gathered five of the most common ways scammers target individuals. … Read More
You Need Stronger [email protected]\/\/0Rd5
In today’s technologically-advanced world, passwords serve as the gatekeepers to nearly every facet of our lives. We use them to secure things from personal accounts containing health or banking information to business networks with confidential internal and client data. Yet we’re notoriously bad at creating passwords that protect these details. Creating stronger passwords According to Verizon’s 2020 Data Breach Investigations … Read More
BEWARE! Top Scams in 2020!
With the increase in e-commerce and online marketing, cybersecurity threats are continuing to flood the marketplace. Scammers are adept at using fear to convince people to do irrational things, such as disclosing confidential or financial information. The best guard against scammers is to constantly stay informed about the latest methods they are using in the marketplace. Below are the 5 … Read More
Managed Service Providers (MSP): A Small Business IT Solution
According to Glassdoor estimates, a single IT manager pulls an average annual salary of more than $85,000. For small business owners, this can be a tough pill to swallow. You can’t afford to operate without an IT expert in your corner to oversee major business functions like data management, information security, or general technical support and troubleshooting — but you … Read More
What are web cookies?
You have probably noticed the “accept cookies” pop up button on websites you visit. Most of the time, you click accept and move on with your business without giving it a second thought. Sometimes, you might be left wondering what are web cookies, and should you be concerned about allowing websites to collect them?
Risk Assessments: Protecting Your Small Business
In 2018, 4iQ reported that cybercriminals were preying on small businesses more than ever. The 2020 Verizon Breach Report confirmed that cyberattacks on small companies compromised credentials, personal or medical information, or internal details a combined 96% of the time. Risk is an inherent component of operating a business. Still, not all risk is created equal—and the hidden costs of … Read More