Get Our Complimentary Guide to Freeing Your Files in a Ransom Ware Attack – And Avoiding One
According to a recent report from Datto, a leading provider of cyber security services and solutions to managed service providers (MSPs) like us, ransomware attacks are continuing to grow like wildfire and are expected to continue increasing at a rapid clip. These costly cyber security attacks tie up your data until you pay a ransom to the hacker. It’s not just the ransom money, but also the downtime and loss of productivity that make this a threat to avoid or manage efficiently.
Critical for IT Network Security and Regulatory Compliance
This post will outline how to build effective cyber security training programs for employees. Here’s why it’s important for you to read on and then take action if you haven’t already done so:
Identify and Manage All Hardware and Software on Your Network
As we’ve been discussing, protecting your IT network from online threats requires a cyber security plan. Arguably, the first step in that plan is to identify and inventory all of the hardware and software on the network. This is critical to IT inventory management -- an ongoing, multi-step effort to make sure every element of the network has up-to-date protection against vulnerabilities. It is considered a best practice for regulated entities. This post will outline key issues of inventory management beginning with why it’s so important.
Security Updates Must Go Beyond Your Operating System to 3rd Party Software, Apps
Many of our clients are regulated entities in financial services and healthcare. In our ongoing concern for their cyber security in the face of increasing and evolving threats from individual and nation state bad actors, patching security vulnerabilities in software and applications is an integral part of every cyber security program we implement. Because many companies believe that their Microsoft and Apple security updates have them covered, this post shares some additional software patch management best practices.
The ‘Encryption Myth’ May Open Regulated Businesses to Added Security and Compliance Risk
This post is motivated by the growing number of inquiries we’re receiving from clients about whether they should be using one of the cloud-based email encryption services available today from companies including Citrix, Sharefile, Smarsh, AppRiver and others. Many of our clients are in regulated industries -- financial services and healthcare.
Don't Let Their Holiday Technology Gifts Become 'Gifts' for Hackers
Our last post discussed the importance of cyber security training for employees. Along those lines, at holiday time we always make sure to alert our customers and their staffs to a particular concern: devices received as personal gifts that will also be used for business. If they’re not set up according to best practices by your network security team, they could represent a serious cyber security threat and compliance problem for your regulated business.
Take Action Before Letting Alexa, Siri and Bixby Into Your Private Meetings!
Are our artificial intelligence devices listening to us all the time and saving our conversations? The fact is, we just don’t know. Although most of the alarm has centered around home use of these devices, it’s time that we consider the potential negative implications on data security and privacy in the workplace – especially as regards regulated businesses. So what do we know?
Earlier this month, the U.S. Department of Justice filed charges against a N. Korean hacker who they say was behind such infamous incidents as the WannaCry ransomware attack, the attack on SONY over its release of a film unfavorable to N. Korean leader Kim Jung Un, and the $81 million Bangladesh Bank heist.
The DOJ’s action is a reminder that businesses are vulnerable and must take proactive steps to assure cyber security – especially regulated companies. These steps include network penetration testing, ongoing identification and patching of software and network vulnerabilities and other measures.
Another Free Tool to Defend Against Hacker Threats
Here at Soundshore Technology Group we are increasingly focused on cyber security. We’ve just launched a second tool – a Cyber Security Self-Assessment Checklist -- that companies can download for free to help them look in the right places and ask the right questions to assure their networks and systems are defended. This follows a special offer for new and prospective customers that we launched a few weeks ago – a free external Cyber Security Vulnerability Assessment, a process that we perform.