Drawing up a disaster recovery plan for a small- to mid-size business can be a challenging prospect. You may have looked online for a generic guide on how to write a disaster recovery plan. While this can be a good start, there are also steps you should include that you may not consider after looking at a blank template.
Let’s take a closer look at six steps that might be missing from your disaster recovery plan, why you should include them, and how to implement them into your plan. Continue Reading
In the last few years there have been a lot of news articles and upsetting stories about companies and their websites ravaged by the ransomware trend. While the tactic isn’t exactly new, this type of encryption-based malware has become an alarmingly popular trend among the hacker communities that target both businesses and private computers. The oh-so-clever idea is not just to do damage like worms that simply delete files or spyware that silently steals data. Instead, hackers stand a chance to directly make a little (or a lot) of cash off their victims by holding their precious files hostage and demanding a crypto-currency ransom. Continue Reading
Juice jacking is a serious threat to people going about their normal business and simply trying to charge their devices in any public space. You would never even think it was something that could happen unless you’re looking out for it. Here are some important things you need to know about juice jacking and how it can cause people to damage your devices and steal your personal information. Continue Reading
Most phishing email goes after mass targets. It’s not particularly well-crafted, but the senders expect that if they hit enough mailboxes, some victims will open the attachment or visit the malicious website. A growing portion, though, targets specific companies or individuals with carefully crafted messages. It’s called spearphishing. When it’s aimed at high-profile individuals or large assets, it’s also called whaling — going after really big fish. (All right, a whale isn’t really a fish.) Continue Reading
Welcome back to the second half of our two-part series on when and why your business should be using encryption. If you joined us last time, you’ve probably started to realize just how useful encryption is and that it can be applied to anything you’d like to keep safe from hackers, whether or not they make it past your firewall. In the first half, we covered encrypting client payment data at every stage and began to talk about the risk of identity theft if hackers get ahold of either client or employee personal information. Let’s pick back up where we left off at storing personal information once you’ve collected it. Continue Reading
Every modern company with a few computers and a business network are aware of the dangers of hackers and security breaches. When a hacker gets their grubby fingers on private information stored by your company, they can do a lot of damage. Customer information can be used for payment scams or identity theft while sensitive business information can be used against you on the market or leaked to your competitors to great detriment. Every business strives to keep their security systems as close to the cutting-edge and maximum protection as possible but, let’s face it, every now and then someone gets hacked. Whether it was a failure on their part or a particular moment of inspiration from the hacker, when your network has been breached, you absolutely must have a backup plan. Continue Reading
It is difficult to overstate the importance of having a rock-solid backup and recovery plan for your company’s data. Although nearly every business has some form of backup plan in place, many fail to take all the necessary steps to ensure that their plan will deliver when they need it most. Here are five simple principles you can follow to improve your company’s backup and recovery plan: Continue Reading