You likely have IT security features on existing solutions you’re not using. That can lead you to invest in products you already have. As we work with businesses to set up remote work, we’re challenging them to invest smarter. We run an assessment to gain a comprehensive picture of the tools they pay, highlight security gaps and plan next steps to truly protect their business.
Start by taking a look at your subscriptions, apps and operating systems to fully understand what you’re already paying for and how to use it best. Start with security and solutions in Microsoft 365.
If history is any guide, we could
be seeing more news articles about ransomware attacks in early 2020. On January
14, 2020, Microsoft Windows 7 and Server 2008 will enter end-of-support.
Microsoft will stop offering security patches, leaving any organization running
these systems exposed to cyberthreats. An infamous example of what can go wrong
is the May 2017 WannaCry attack.
WannaCry: A Microsoft End-of-Support Worst-Case Scenario
On May 12, 2017, the National
Health Service (NHS) in the United Kingdom was paralyzed by a ransomware attack
when cybercriminals exploited a flaw in WindowsXP. Support for WindowsXP had
ended in April 2014, but the NHS continued relying on the system.
A business owner runs through the street as buildings burn
around him. He clutches his business’ server in his hands as he runs, searching
Sounds like the opening to an end-of-the-world movie, right?
Unfortunately, this happened last year to a large medical center with numerous
locations around California during the Santa Barbara fires. Because he didn’t
have a disaster recovery plan in place, this business manager did the only
thing he could think of to protect his data – unplug his server, grab it and
Just because your business is small doesn’t mean you’re immune from computer viruses, malware and other cyber-attacks. Although it sounds logical for hackers to target larger businesses because of their larger amounts of data, research shows small and medium businesses are just as likely to be attacked as larger enterprise businesses, according to the 2018 Symantec Internet Security Report. In fact, small and medium businesses may be even more vulnerable than their larger counterparts because of the tendency of smaller companies to spend less on security.
Many smaller businesses have not increased their cybersecurity even though they often have poorly secured servers, unprotected endpoint devices and vulnerable storage and back-up processes. With the increased usage of mobile devices to accommodate today’s mobile workforce, the door to your data is opened wide if a laptop or smart phone is lost or stolen.
Hackers aren’t about who they attack – they’re happy to steal from any business. They typically take a shotgun approach, aiming at as many businesses possible to make small amounts of money per breach. This spray-and-pray approach increases cyber risks exponentially for smaller businesses.
In conversations about cloud computing, people tend to refer to the tool as “The Cloud” which implies that somewhere out there in the virtual world is a single place where all data and online apps live. Actually, there are many cloud services available. In fact, the virtual world can be downright overcast with the number of cloud choices.
Cloud computing gives businesses access to data, apps, services and files anywhere, anytime. The problem is – what if it also allows access to anyone?
The Cloud especially improves team collaboration when a business has multiple locations or even numerous employees working on the same project in the same location but on individual devices. Teams that use social technologies like cloud collaboration tools have raised their productivity over 20 percent.
It seems a full week can’t go by without another headline about an organization getting breached. Whether it’s a new phishing scheme, a major malware attack on a city municipality or a strategic ransomware threat, the dangers are real, and the costs can be extraordinary. The cybersecurity landscape continues to evolve and as modern technology advances, security threats do as well. What protections do you need in place for you to sleep better at night?
In 2017, the world saw the rise of ransomware as the names of famous ransomware attacks permeated the news such as Petya, Goldeneye and more. According to Secplicity, “…malware is at an all-time high, global ransomware damages are predicted to exceed $5 billion, and data records are being stolen by hackers at a rate of more than 5 million a day.”
Slowly but surely, cities around California are experimenting with body cameras on their police officers. Studies suggest that these have the potential to dramatically improve the relationship between the police and the community. It is a big decision, however; Los Angeles, for example, is weighing the hefty $57.6 million price tag for outfitting the LAPD over the next five years.1 Meanwhile, Sacramento’s mayor implored the chief of the SPD to consider body cameras to “restore the connectivity between our officers and the community.”2 That connectivity isn’t free, however. Beyond the $500-to-$1,000-per-unit cost3 of the cameras themselves, there are significant logistical issues to be worked out on the IT side of the equation: where to store the footage, how to organize it, how to keep it secure, and so on. In lieu of weighing down the police department’s IT team with several new headaches, it would be wiser (and cheaper!) to trust the right partner for storing data on a secure cloud.