How is BYOD a security risk?

How is BYOD a security risk?

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data.

How to find out if your computer has a virus

How to find out if your computer has a virus

Your computer has been acting up a lot lately. It keeps crashing, it’s slow and, to top it off, you keep getting pop-ups you don’t want to see. If these problems keep occurring then your computer may have a virus. So is there a way to prevent things like this from happening again? While there are various antivirus solutions you can take, it’s best to know how malware affects your computer first so you can quickly recognize and deal with the problem.

Imminent Danger

Imminent Danger

Are you actually paying someone to cause your downfall? Would you pay a criminal to break into your business?  Would you hire a corrupt bookkeeper you know nothing about and then give them full access to your bank accounts and credit cards?  Of course not!  Yet we constantly see something far more damaging.

Monitoring employees online. Is it right?

Monitoring employees online. Is it right?

Whether or not to monitor your employees’ computers can be a tricky decision. While part of you may think it’s unethical, you also may question if your staff are spending too much time on non-work related activities, and taking advantage of you in the process.

Cyber threats and the finance sector

Cyber threats and the finance sector

The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them.

WARNING AFTER INTIMATE PHOTOS SHARED PUBLICLY

WARNING AFTER INTIMATE PHOTOS SHARED PUBLICLY

The former girlfriend of George Zimmerman has shared her take on the sharing of very private information, for the first time on television. Her former boyfriend shared intimate photos of her on social media without her permission. Much of her time with Zimmerman was good until she started to get text messages and voicemails from total strangers.

Phone and email threats hard to trace

Phone and email threats hard to trace

Schools in Palm Beach County District have received at least 14 threats this school year alone, all of which are being actively investigated. There have been no arrests. Early in February, two different Palm beach County schools received two threats, one by phone and one by email.

IT Security Policies you need to implement

IT Security Policies you need to implement

Most business owners have an employee handbook. But when it comes to the online security of their business, often times this portion is either not adequately addressed, or not addressed at all. However, with cyber crimes an ever increasing threat, and the fact that employee error is one of the most common causes of a security breach, it is incredibly vital that your staff is informed of your policies.

Security tips for the small business

Security tips for the small business

It’s been said so many times that many small business owners are likely to block it out, but the truth remains: cyber criminals target SMBs. Perhaps the reason for this ignorance is that when an SMB falls victim to an online attack, it’s not breaking news.