Weekly Tech Tip: The Biggest Cybersecurity Risk

What’s the biggest cyber security risk?

You have lots of responsibilities as the leader of your business. Driving growth is important, as is checking your staff are fulfilled and enjoying their work. Another is making sure the business is protected from predictable threats.

Weekly Tech Tip: Business Continuity Plan

 

Technology has reached a point where it’s critical to virtually all businesses… but is constantly under attack. How long could your business survive without any internet access, or even your data? A day? A week? Would you still have a business in a month?

In our new video we explore how easily “business as usual” can be disrupted, and why you need to be fully prepared with a business continuity plan.

5 Password Tips

As we finish out National Cybersecurity Awareness Month, we'd like to leave you with these 5 great password tips...

 

 
5 Password Tips

Use different passwords on different systems and accounts
Use the longest password allowed
Use a mix of uppercase and lowercase letters, numbers, and symbols
Reset your password every few months
Use a password manager

If you have questions about any of these recommendations, always feel free to give us a holler.

4 Tips to Better Protect Yourself Online

During this Cybersecurity Awareness Month, today's blog shares some great tips to help better protect yourself online from cyber attacks.

 
4 Tips to Better Protect Yourself Online

Secure your networks.
Wireless routers are a way for cybercriminals to access online devices.

What are some other Avenues of Cyber Attack to know about?

During this Cybersecurity Awareness Month, today's blog answers the question, "What are some other avenues of cyber attack I should know about?"

 

 
Other Avenues of Cyber Attack
What is it?
 Internet of everything
 Any device connected to your network
 Information collection
 Remote access
 Bluetooth
 Open ports

Why should you care?
 Your network can be used to attack someone else
 Any device that stores information or is connected to the internet can be a vulnerability
 Assume that you are vulnerable, and take measures to understand and mitigate risk
 Don‘t be the “low-hanging fruit”

Examples of where these types of attack could originate:
 Smart devices
 Mobile phone
 Thermostat
 Vehicles
 Gaming consoles
 Printers
 Medical equipment
 Industrial systems

We've created some great resources and articles on how to stay cybersafe.

What is Swatting and Why Should You Care?

During this Cybersecurity Awareness Month, today's blog answers the question, "What is Swatting and Why Should You Care?"

 

 
Swatting
What is it?
An attack centered around location sharing in which bad actors call the police claiming the victim has committed a crime…
 Bomb Threat
 Armed Intruder
 Violent Incident

Why should you care?
 Physical and immediate consequences
 Sometimes was intended merely as a prank
 Arrest and serious injury can result
 Reduce risk by sharing your location only with trusted individuals, and share vacation photos only after you’ve returned safely home

Tip - Your location is embedded as metadata in every picture you take with your
phone.

What is Social Engineering and Why Should You Care?

During this Cybersecurity Awareness Month, today's blog answers the question, "What is Social Engineering and Why Should You Care?"

 

 
Social Engineering
What is it?
Cybercriminals can take advantage of you by using information commonly available through…
 Social media platforms
 Location sharing
 In-person conversations

Why should you care?
 Your privacy isn’t just a luxury – it’s a security measure
 Attacks can be successful with little to no programming knowledge or ability
 Technological security measures can only protect you so much – you are your best defense

Examples include:

 Phishing
 Pretexting
 Baiting
 Quid pro quo
 Tailgating
 Inside job
 Swatting

We've created some great resources and articles on how to stay cybersafe.

What are Physical Cyber Attacks and Why Should You Care?

During this Cybersecurity Awareness Month, today's blog answers the question, "What are Physical Cyber Attacks and Why Should You Care?"

 

 
Physical Cyber Attacks
What is it?
Physical cyber attacks use hardware, external storage
devices, or other physical attack vectors to infect, damage, or
otherwise compromise digital systems.

What are Bots and Why Should You Care?

During this Cybersecurity Awareness Month, today's blog answers the question, "What are Bots and Why Should You Care?"

 

 

BOTS
What is it?
Bots are a type of program used for automating tasks on the internet.

Why should you care?
Malicious bots can:
 Gather passwords
 Log keystrokes
 Obtain financial information
 Hijack social media accounts
 Use your email to send spam
 Open back doors on the infected device

Did You Know?
Not all bots are bad.

What is Ransomware and Why Should You Care?

During this Cybersecurity Awareness Month, today's blog answers the question, "What is Ransomware and Why Should You Care?"

 

 

RANSOMWARE
What is it?
Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.