Eric Benda, CEO


Recent Posts

Does the EU’s GDPR Affect US Data Privacy and Cyber Security Compliance Strategy?

May 8, 2019 2:21:06 PM / by Eric Benda, CEO posted in Compliance, cyber security, data privacy

0 Comments

Yes, Especially Regulated Industries. And US Regulations Are Coming. Prepare.

Read More

Cyber Security Services: Do You Need A Data Hostage Negotiator?

Apr 8, 2019 9:00:00 AM / by Eric Benda, CEO posted in cyber security, cybersecurity

0 Comments

Get Our Complimentary Guide to Freeing Your Files in a Ransom Ware Attack – And Avoiding One

According to a recent report from Datto, a leading provider of cyber security services and solutions to managed service providers (MSPs) like us, ransomware attacks are continuing to grow like wildfire and are expected to continue increasing at a rapid clip. These costly cyber security attacks tie up your data until you pay a ransom to the hacker. It’s not just the ransom money, but also the downtime and loss of productivity that make this a threat to avoid or manage efficiently.

Read More

Building Cyber Security Training Programs for Employees

Mar 5, 2019 9:00:00 AM / by Eric Benda, CEO posted in Compliance, cyber security, training

0 Comments

Critical for IT Network Security and Regulatory Compliance

This post will outline how to build effective cyber security training programs for employees. Here’s why it’s important for you to read on and then take action if you haven’t already done so:

Read More

Cyber Security Plan Step 1: IT Inventory Management

Feb 7, 2019 12:21:34 PM / by Eric Benda, CEO posted in cyber security

0 Comments

Identify and Manage All Hardware and Software on Your Network

As we’ve been discussing, protecting your IT network from online threats requires a cyber security plan. Arguably, the first step in that plan is to identify and inventory all of the hardware and software on the network. This is critical to IT inventory management -- an ongoing, multi-step effort to make sure every element of the network has up-to-date protection against vulnerabilities. It is considered a best practice for regulated entities. This post will outline key issues of inventory management beginning with why it’s so important.

Read More

Software Patch Management Best Practices: A Key Part of Your Cyber Security Program

Jan 4, 2019 2:18:01 PM / by Eric Benda, CEO posted in cyber security

0 Comments

Security Updates Must Go Beyond Your Operating System to 3rd Party Software, Apps

Many of our clients are regulated entities in financial services and healthcare. In our ongoing concern for their cyber security in the face of increasing and evolving threats from individual and nation state bad actors, patching security vulnerabilities in software and applications is an integral part of every cyber security program we implement. Because many companies believe that their Microsoft and Apple security updates have them covered, this post shares some additional software patch management best practices.

Read More

Encrypted Email Services: Know What You're Getting

Dec 19, 2018 8:55:00 AM / by Eric Benda, CEO posted in Email encryption

0 Comments

The ‘Encryption Myth’ May Open Regulated Businesses to Added Security and Compliance Risk

This post is motivated by the growing number of inquiries we’re receiving from clients about whether they should be using one of the cloud-based email encryption services available today from companies including Citrix, Sharefile, Smarsh, AppRiver and others. Many of our clients are in regulated industries -- financial services and healthcare.

Read More

Cyber Security Training for Employees: Protecting New Personal Devices

Nov 7, 2018 8:42:00 AM / by Eric Benda, CEO posted in cyber security, cybersecurity

0 Comments

Don't Let Their Holiday Technology Gifts Become 'Gifts' for Hackers

Our last post discussed the importance of cyber security training for employees. Along those lines, at holiday time we always make sure to alert our customers and their staffs to a particular concern: devices received as personal gifts that will also be used for business. If they’re not set up according to best practices by your network security team, they could represent a serious cyber security threat and compliance problem for your regulated business.

Read More

Is AI Snooping On Your Office Conversations? Cyber Security Training Can Keep Them Confidential

Oct 11, 2018 5:53:03 PM / by Eric Benda, CEO posted in cyber security

2 Comments

Take Action Before Letting Alexa, Siri and Bixby Into Your Private Meetings!

Are our artificial intelligence devices listening to us all the time and saving our conversations? The fact is, we just don’t know. Although most of the alarm has centered around home use of these devices, it’s time that we consider the potential negative implications on data security and privacy in the workplace – especially as regards regulated businesses. So what do we know?

Read More

Recent DOJ Hacker Charges a Reminder: Do Network Penetration Testing, Patching for Cyber Security

Sep 27, 2018 8:30:00 AM / by Eric Benda, CEO posted in cyber security, assessment, penetration testing

0 Comments

Earlier this month, the U.S. Department of Justice filed charges against a N. Korean hacker who they say was behind such infamous incidents as the WannaCry ransomware attack, the attack on SONY over its release of a film unfavorable to N. Korean leader Kim Jung Un, and the $81 million Bangladesh Bank heist.

The DOJ’s action is a reminder that businesses are vulnerable and must take proactive steps to assure cyber security – especially regulated companies. These steps include network penetration testing, ongoing identification and patching of software and network vulnerabilities and other measures.

Read More

Get Our Cyber Security Self-Assessment Checklist

Sep 25, 2018 12:26:43 PM / by Eric Benda, CEO posted in Security, IT Support, cyber security, assessment

0 Comments

Another Free Tool to Defend Against Hacker Threats

Here at Soundshore Technology Group we are increasingly focused on cyber security. We’ve just launched a second tool – a Cyber Security Self-Assessment Checklist -- that companies can download for free to help them look in the right places and ask the right questions to assure their networks and systems are defended. This follows a special offer for new and prospective customers that we launched a few weeks ago – a free external Cyber Security Vulnerability Assessment, a process that we perform.

Read More