Sun, December 03, 2023

Cyber Security

Cyber Security

Preventing cyber-attack chaos

Don’t be mistaken, just because your business isn’t experiencing daily attacks on its physical security, you are still under cyber-attack. Hackers wish to do your business harm and you need to have a security posture that will protect your organization against anything that could bring it down. They are not only interested in the monetary value that an attack would mean, but they also just like the chaos that is caused when they are able to break into your system. The best defense against these attacks is having a good

Read More »
Cyber Security

Blocking all the spam

Cyberthreats are all around us and the primary threat vector for your business is email. This method of attack is the easiest way for hackers to attack your system. Employees will run across emails enticing them to click on links that would lead them to corrupt sites that would infect your network. To combat these attacks, good spam software is important. That software must include URL rewrites to make sure your email is as protected as possible. For example, you have a link in your email and see that it

Read More »
Cyber Security

Are your passwords weak or strong?

Hackers are everywhere and they are looking for weak passwords to get in and cause destruction on your networks and devices daily. The best way to combat that is through strong passwords. They need to be complex and lengthy. Be sure to include numbers, letters, and symbols with a good number of characters. Even with today’s sophisticated hacking methods, computers still are not able to crack long passwords quickly. The challenge is how you remember a secure password with all those numbers, symbols, and letters. Well, your answer would be

Read More »
Cyber Security

Hope for the best, plan for the worst

What would happen if your organization was hit with a catastrophic loss? Even though it may not be the most enjoyable process to think about, it’s good to go over the “what ifs” to protect your business should a catastrophic loss of data or physical location occur, whether it be a flood, fire, or hurricane. Do you have a plan should one of these natural disasters hit your business? To begin, my recommendation would be to start by asking yourself and your trusted co-workers, “How would we return to business

Read More »
Cyber Security

Secure storage for business on the go

Do you have a need for portable storage? You may not think about security when it comes to jump drives, but security is still important when you need to bring your data with you. Especially, if you have patient data or financial data that you need to keep secure as you travel. The good news is, there are options available now that are cost-effective and will protect your data well. For instance, a 138GB reader with fingerprint partition costs around $30-40. To open the secured section, you will need to

Read More »
Cyber Security

Breached? Burn it to the ground

In today’s business world, everyone knows that all computers on your network need to be covered by antivirus software. Microsoft is aware that this is an important layer of protection because they offer a free version installed with each Windows operating system. However, you may not be fully protected with just that software. Even Microsoft offers a paid version of the software for more advanced protection. Cross Link Consulting uses Sentinel One as their software of choice. Should a hacker break through your antivirus protection, the only thing left to

Read More »
B2B Stories

Cyber attack hits millions including the CSRA

A sprawling cyber attack late last week compromised data for millions of people including state and federal agencies. On the list of those hacked was the Department of Energy. The Savannah River National Laboratory is under the DoE umbrella. The University of Georgia was also impacted by the breach. How many of you have kids that attend UGA or donate to the University? What does this mean for us and what is the potential impact? How does Fort Gordon’s Cyber Security Center fit into the mix? ABD turned to our

Read More »
Cyber Security

Download overload?

Your system may currently allow each employee to install any software they may need or want on their computer. Even with the best of intentions for these installations, if left unchecked, your system may be negatively impacted. If you are not in control of what is coming and going on your network, you are opening yourself up for hackers to take advantage of the situation. You may want to implement a policy to prevent employees from downloading software without admin consent. This simple procedure of requiring an admin to give

Read More »
Cyber Security

LOB can help prevent hacking

Do you have office computers that run slow? When was the last time you checked on the computer that runs your reception or check-in areas? If your computers are loaded up with software that is not specific to run the operations of that position, then, you may need to listen up. Line of Business applications or LOB for short, are what you need to strive to maintain across your organization. LOB applications are computers that only have software installed that are mandatory for that computer to process operations meant for

Read More »
Cyber Security

Password protection for your business

Most any site that you go to these days requires you to have an account set up, which also requires you to have yet another password to remember. Good password management practices for your business will give you an added layer of protection against hackers looking for profiles they can hack. Today, I want to give you two things you can implement right now to be able to have better password management. Complex Passwords First, a word of advice I can give you is to have complex passwords. They need

Read More »