“Is This Email Real?” 4 Questions to Ask Yourself

Every day every person with email is put to the test. No matter the job title or position, we all get phishing emails. And no matter your knowledge of cybersecurity, you make the initial decision of whether a message is malicious. So, when deciding whether to call the IT Help Desk, here are some solid, simple tips and tricks from the top to help ANYONE dodge bad guys' phishing hooks, nets, and spearguns.

IT Disaster Preparedness

November 16th, 2020

'Storm preparation' is a term with which people across the gulf coast are intimately familiar. Most of the tools we need from June to November (and this year possibly longer) have become second-nature. Sandbags. Non-perishable foods. Battery-operated radios.

Infographic: 8 Cybersecurity Work From Home Tips

Work from home is the new normal.
For many, it is likely to continue to some degree long after the COVID-19 crisis.  Here are 8 cybersecurity work from home tips to protect yourself digitally.

Feel free to download and distribute this infographic.
Click to Download

Clarifying the CMMC Timeline

Version 1 of the much anticipated Cybersecurity Maturity Model Certification (CMMC) framework was release by the Pentagon on January 31. Many news outlets are reporting that, "All DoD contractors must be certified by 2025." This is a correct statement, but a misleading timeline.

Spread Awareness and Review Your Cybersecurity Guidelines

Whether it is about developing an application, managing a network or even organizing files, security guidelines are essential. The organizations that keep their security guidelines aligned and in place from the start not only can assess their options but also make reasonable decisions based on the type of industry and the sensitivity of the information.

Why Are IT Policies & Procedures Important

IT policies and procedures play a strategic and crucial role in making sure that the company’s corporate information is safe. Know that policies can address requirements to protect confidential information from unauthorized access, disclosure, corruption, loss, and interference in both physical and electronic formats.

Cyber Insurance

Do you need it and, if so, what kind?

I am not a cyber insurance expert, nor am I qualified to give legal advice, but as someone who thinks a lot about IT vulnerabilities and threats, I believe that every business should evaluate the cost-benefit of cyber insurance to help protect from cyber risk.

Cybersecurity

Like much of IT, cybersecurity is not a one-size-fits-all proposition. The comprehensive approach that large enterprises should employ to identify and address risks and detect and respond to attacks is often out of reach for small businesses. Yet as the frequency and impact of cyberattacks on businesses of all sizes continues to grow, the typical small-business approach of taking the usual precautions and hoping for the best is proving to be inadequate.

The Mobile Device Security Risk

What’s your business’ policy for dealing with mobile device security?

The immense popularity of mobile devices is inescapable, yet most small businesses have given little real thought to how best to manage them. Until recently, I shared the opinion that there often isn’t much to worry about.

Think Before You Click

Cybersecurity awareness is key for business.

From a cybersecurity standpoint, the one behavior that leads to more headaches than any other for small or midsize businesses is people clicking (or otherwise acting) on things in emails that they shouldn’t.

The IT team can help: Certainly scanning email for malware or signs of phishing is a must.