504-588-2000
4423 LaSalle St.
Contact Us

Cybersecurity Beyond the Basics: Network Segmentation

An employee gets an email that says their invoice is attached. Opening the attachment downloads a computer virus that encrypts the files on their computer in seconds. The virus spreads to other computers in the company and soon the entire network is taken down and a cyber-criminal is demanding a hefty ransom in return for the encryption key that’s required to release the data. This is what cyber experts call – a cold, dark day. It’s the day when you have a cyber-attack. While cyber-attacks like this ransomware scenario can happen quickly, these days it’s more common for the bad […]

Read More

Cybersecurity Beyond the Basics: The Principle of Least Privilege

The principle of least privilege

With a Zero Trust strategy for cybersecurity, the presence of an intruder is assumed. That means that tactics are needed to limit exposure and the potential damage that the intruder can do. One of those tactics is the Principle of Least Privilege. Least privilege involves matching up permissions to access data with the job or tasks that need to be done. This starts with determining exactly what data is needed to perform specific functions and then establishing limits. Historically, companies have been quite relaxed when it comes to allocating permissions with user and even administrator accounts because opening up access […]

Read More

Cybersecurity Beyond the Basics: What is Zero Trust?

What is Zero Trust

Imagine that you’re in charge of protecting a castle. The castle has a drawbridge and a moat around it. You have guards stationed at the drawbridge who monitor the people coming into the castle. The guards let citizens in and keep known bad guys out. Because the guards prevent the bad guys from coming into the castle, the citizens can safely go about their business. Now imagine that the bad guys have found other ways to get inside the castle besides the drawbridge. They’re scaling the walls unseen at night. They’re getting past the guards by disguising themselves as citizens. […]

Read More

12 Essential Cybersecurity Measures for All Businesses

12 essential cybersecurity layers you can't ignore

It used to be that cybersecurity for businesses meant creating a technical barrier around their network and data and they were good to go. Sadly, that’s not enough anymore. Cybersecurity risks for business have evolved and so has the technology that your employees work with every day. Your organization is probably using more cloud apps and have your people working from more locations than ever before and cybercriminals would love to exploit the vulnerabilities that you don’t know are there. The bottom line is that yesterday’s cybersecurity strategy isn’t going to address today’s challenges with IT security for businesses. The […]

Read More

Is this Website Address Safe to Visit or Login To?

Here are some ways you can decide whether to trust a website link or page in a web browser and tell when things smell phishy. Taking the time to look for signs of a hack attempt in links and websites is like washing your hands; it helps keep you and your co-workers safe, and every adult should know how to do it. We’ll start with the best ways to tell if a link or website is safe or a hack attempt. First, look at the link address you are about to visit. In many cases, you can hover your mouse […]

Read More

“Is This Email Real?” 4 Questions to Ask Yourself

Every day every person with email is put to the test. No matter the job title or position, we all get phishing emails. And no matter your knowledge of cybersecurity, you make the initial decision of whether a message is malicious. So, when deciding whether to call the IT Help Desk, here are some solid, simple tips and tricks from the top to help ANYONE dodge bad guys’ phishing hooks, nets, and spearguns. Not everyone has the time to call their IT provider’s remote support just to check emails every morning. You can follow the ‘WHO, WHAT, WHERE, AND WHEN’ […]

Read More

IT Disaster Preparedness

‘Storm preparation’ is a term with which people across the gulf coast are intimately familiar. Most of the tools we need from June to November (and this year possibly longer) have become second-nature. Sandbags. Non-perishable foods. Battery-operated radios. Flashlights. But in the IT world, there are other tools we use in storm and disaster preparation, devices that are essential to any small business trying to stay afloat during a catastrophic event. As Bellwether’s Data Assurance Engineer, it is my job to use Backup and Disaster Recovery tools to protect our clients. These essential tools preserve a company’s files and servers […]

Read More

Infographic: 8 Cybersecurity Work From Home Tips

Work from home is the new normal. For many, it is likely to continue to some degree long after the COVID-19 crisis.  Here are 8 cybersecurity work from home tips to protect yourself digitally. Feel free to download and distribute this infographic. Click to Download

Read More

Clarifying the CMMC Timeline

Version 1 of the much anticipated Cybersecurity Maturity Model Certification (CMMC) framework was release by the Pentagon on January 31. Many news outlets are reporting that, “All DoD contractors must be certified by 2025.” This is a correct statement, but a misleading timeline. Starting in June of 2020, all newly issued RFQs will require CMMC compliance (likely level 1 or 2) in order to receive the Federal Contract Information required to participate in the bidding process. Since multi-year Federal contracts are limited to 5 years, by 2025 all DoD contracts will have cycled through under the new rules, making this […]

Read More

Spread Awareness and Review Your Cybersecurity Guidelines

Whether it is about developing an application, managing a network or even organizing files, security guidelines are essential. The organizations that keep their security guidelines aligned and in place from the start not only can assess their options but also make reasonable decisions based on the type of industry and the sensitivity of the information. Threats to business data may change or transform with time, but the basics of security remain the same. Federal Trade Commission (FTC) has outlined a guideline for protecting sensitive and personal information. It guides businesses about how to keep personal information in documents and on […]

Read More
Subscribe to our Blog Sign up now!