Signs you have weak enterprise security

As cyberthreats become more sophisticated, many businesses need to prioritize cybersecurity more than ever. But are you sure that your security measures are keeping your enterprise IT assets safe? Here are five signs that they may not be effective.

Open wireless networks

With just one main internet line and a couple of wireless routers, an entire office can get online.

Don’t be a victim of juice jacking

Smartphones have become an indispensable tool for most of us. We use them for a wide range of activities, from gaming to checking social media to accessing work apps. Because of heavy use, our smartphones may sometimes run out of battery. When that happens and you’re out in public with no access to your charger, using public charging kiosks to bring your phone back to life can seem like a good idea — but it’s not.

Two excellent ways to verify user identity

A secure login process is an excellent way to protect your business from cybercriminals.

When it comes to verifying user identity, you can choose between two-step authentication and two-factor authentication. Learn the difference between the two so you can have a better appreciation of your cybersecurity options.

Cybersecurity Breaches and Small Business: A Matter of If or When?

By Vince Tinnirello

Cybersecurity breaches are a daily news item these days. The most recent breach of Equifax has affected millions of Americans. You can see if you were personally affected by this breach by going here:

Check with Equifax

While we’ve almost become immune to the hacks of big businesses such as Target, Home Depot, and Equifax, little attention is being paid to cybersecurity breaches in small business.

You Need To Stop Using Internet Explorer Today…

A new zero-day vulnerability that resides in all versions of Microsoft’s Internet Explorer was detected this past weekend (April 26-17, 2014), Microsoft confirmed.
The vulnerability, which could allow remote code execution, is being used in "limited, targeted attacks," according to an advisory issued by Microsoft.

Are you really watching your network?

The reality is that many business owners don't keep a watchful eye on their network's health.

They are not performing routine or preventative maintenance. A nasty virus, a malicious hacker, or unexpected software corruption, hardware failure, or DOZENS of other problems catch them off guard and result in extensive downtime, data loss, and expensive disaster recovery fees.