Spring is traditionally a time when people do a deep cleaning of their homes. Have you thought about taking this one step further and doing a digital security deep clean? We recommend reviewing at least every quarter to minimize the risk of identity theft. Here are four steps to get you …
Read More »Create a Secure Password
Now is the perfect time to protect yourself and your organization by changing your passwords. Every day hackers steal confidential information because of weak passwords, but not all hackers take what they need and leave—some may continue accessing your account, either to monitor your data or continue stealing information over …
Read More »EU Court of Justice Invalidates the EU-US Privacy Shield
An important and unexpected ruling was handed down by the Court of Justice of the European Union (CJEU) on July 16, 2020, in Data Protection Commissioner v Facebook Ireland Ltd and Maximillian Schrems (“Schrems II”) that invalidates the EU-U.S. Privacy Shield (“Privacy Shield”) arrangement. Since 2016, the Privacy Shield provided …
Read More »5 Ways That Technology is Disrupting the Executive Suite
Take a second to imagine what would happen if the internet went down in your office for a day. It would likely be a disaster, right? Although it wasn’t the case just a decade ago, today, almost every individual is dependent on technology for their productivity. As our work habits …
Read More »The Growing Cyber Threat – Targeting Medical Offices, Practices and Facilities
By Malcolm S. McNeil We have already heard about the recent twitter attack on high profile individuals. However, they are not the only targets of the hackers. Right now we see that medical practices are a target of cybercriminals. The common activity is to forward emails to unsuspecting employees who …
Read More »4 Critical Reasons Why Small Businesses Should Revisit IT Security Now
How should small business leaders think about mitigating information security risk—and with all that’s going on in our pandemic world, why now? It’s a tough problem. Between reports of hackers breaching the networks of even large multinational corporations with staggering resources, the technical complexity of shoring up your defenses, and …
Read More »Designing a Remote Worker Policy
There are a number of issues to consider when creating a remote work policy. Here are some of the bigger questions: Can remote workers fit into your organization’s culture?What positions can be performed remotely? (e.g. a sales position might be a logical “yes,” while a receptionist is obviously a “no”)How …
Read More »Must Haves for Remote Workers
Planning to allow your staff to continue to WFH (work from home) for the next few months and perhaps beyond? Here’s a few basics you’ll want to be sure to have in place for your remote staff: Establish your organization’s Remote User Policy — This policy will help ensure that …
Read More »How to properly sanitize your devices
Be sure to wipe down your devices on a regular basis with the following: Lens Wipes Walmart: http://bit.ly/2TM3bgQTarget: http://bit.ly/2Q00OWBAmazon: https://amzn.to/38ATdnQ Or Electronics Wipes (Do NOT use regular Windex Wipes or glass cleaner) Walmart: http://bit.ly/2vOXSFi Target: http://bit.ly/2VWAxMI Amazon: https://amzn.to/2Iwrav5 Remember: NEVER apply glass cleaner to electronics and never spray any cleaner …
Read More »Configuration Standards
This is a sample configuration standards document. Purpose To protect company data and information systems by ensuring a consistent, secure configuration between resources and maintaining baseline configuration standards. Scope This policy applies to all information systems including but not limited to, laptops, desktops, two-in-ones, mobile devices (phones and tablets), cloud …
Read More »