Cyber Security

Cyber Security

Hope for the best, plan for the worst

What would happen if your organization was hit with a catastrophic loss? Even though it may not be the most enjoyable process to think about, it’s good to go over the “what ifs” to protect your business should a catastrophic loss of data or physical location occur, whether it be a flood, fire, or hurricane. Do you have a plan should one of these natural disasters hit your business? To begin, my recommendation would be to start by asking yourself and your trusted co-workers, “How would we return to business

Read More »
Cyber Security

Secure storage for business on the go

Do you have a need for portable storage? You may not think about security when it comes to jump drives, but security is still important when you need to bring your data with you. Especially, if you have patient data or financial data that you need to keep secure as you travel. The good news is, there are options available now that are cost-effective and will protect your data well. For instance, a 138GB reader with fingerprint partition costs around $30-40. To open the secured section, you will need to

Read More »
Cyber Security

Breached? Burn it to the ground

In today’s business world, everyone knows that all computers on your network need to be covered by antivirus software. Microsoft is aware that this is an important layer of protection because they offer a free version installed with each Windows operating system. However, you may not be fully protected with just that software. Even Microsoft offers a paid version of the software for more advanced protection. Cross Link Consulting uses Sentinel One as their software of choice. Should a hacker break through your antivirus protection, the only thing left to

Read More »
B2B Stories

Cyber attack hits millions including the CSRA

A sprawling cyber attack late last week compromised data for millions of people including state and federal agencies. On the list of those hacked was the Department of Energy. The Savannah River National Laboratory is under the DoE umbrella. The University of Georgia was also impacted by the breach. How many of you have kids that attend UGA or donate to the University? What does this mean for us and what is the potential impact? How does Fort Gordon’s Cyber Security Center fit into the mix? ABD turned to our

Read More »
Cyber Security

Download overload?

Your system may currently allow each employee to install any software they may need or want on their computer. Even with the best of intentions for these installations, if left unchecked, your system may be negatively impacted. If you are not in control of what is coming and going on your network, you are opening yourself up for hackers to take advantage of the situation. You may want to implement a policy to prevent employees from downloading software without admin consent. This simple procedure of requiring an admin to give

Read More »
Cyber Security

LOB can help prevent hacking

Do you have office computers that run slow? When was the last time you checked on the computer that runs your reception or check-in areas? If your computers are loaded up with software that is not specific to run the operations of that position, then, you may need to listen up. Line of Business applications or LOB for short, are what you need to strive to maintain across your organization. LOB applications are computers that only have software installed that are mandatory for that computer to process operations meant for

Read More »
Cyber Security

Password protection for your business

Most any site that you go to these days requires you to have an account set up, which also requires you to have yet another password to remember. Good password management practices for your business will give you an added layer of protection against hackers looking for profiles they can hack. Today, I want to give you two things you can implement right now to be able to have better password management. Complex Passwords First, a word of advice I can give you is to have complex passwords. They need

Read More »
Cyber Security

The business owner and IT connection in cybersecurity

Leadership plays a major role in IT and Cybersecurity for your organization. Without the buy-in from leadership, employees will be untrained and unprepared for a plan of action when breaches happen in your organization. The best way to tackle issues head-on is to work with your IT service provider to create an employee training plan to equip your employees with a plan of action that they need to follow should a breach occur. Time is of the essence when these breaches happen. Additionally, it is important to have a process

Read More »
Cyber Security

Mobile security options

Say, you have a job where you will be out and about and away from a secure internal network and want to know how you can protect your system better. One option that you can consider is a product called Firewalla. This is an affordable way to add extra protection to your network when you are on the go. This company produces a number of different products to meet your specific needs, but the concept of the product is that it gives you a way to connect to Wi-Fi through

Read More »
Cyber Security

Be wary of QuickBooks scam

Every morning, you come into the office, turn on your computer and begin catching up on emails from overnight. You see a QuickBooks invoice email that you were expecting (or so you think) and click on it and BOOM, you are taken to a site you never intended to visit with just the click of your mouse. To protect your organization from such instances, you need good spam ware protection. There are many options out there to choose from for protection, but one feature you need to be looking for

Read More »