Cyber crooks are becoming more and more sophisticated in their attempts to victimize people and steal their sensitive information. Here are five tips that may help you stay one step ahead of cyber crooks. Tip #1: Protect against spear phishing by looking for incorrect or unusual URLs. Spear phishing is when cyber crooks send targeted emails to you hoping you will share personal financial information or passwords. Emails can look very sophisticated and may even address you by name or … [Read more...]
Keeping Trade Secrets a Secret
Maybe you think your business isn’t big enough to have trade secrets – but if you have a list of customers, you have trade secrets. And trade secrets are worth protecting. A trade secret is defined as any valuable commercial information that provides a business with an advantage over competitors who do not have that information. Trade secrets tend to fall into two categories – either technical information or business information. Examples of technical trade secrets include: Plans, … [Read more...]
Security Threats in 2015
According to Wired Magazine, there are 6 key areas that will represent security threats in 2015: Nation-State Attacks According to the author of the article, Kim Zetter, national spy agencies that undermine encryption and install backdoors in systems remain the biggest security threat that computer users face in general. It’s hard to imagine that a national spy organization would waste their time with an individual or a small business owner and really pose a threat – but that’s what the … [Read more...]
Passwords Help Keep Data Secure
The first step towards keeping your data secure is setting up good passwords. I hate to admit this, but one time I forgot my smart phone at the gym. I had already gotten home and showered before I remembered that I left it on the elliptical machine. The worst part was that I had not set up a password for the phone - so anyone could take my phone and open my emails, access my contacts, and find out a whole lot about me. One simple step could have kept my data secure – setting up a password. … [Read more...]
Is Your Business Data Destruction Compliant?
Business owners and managers are aware of cyber-attacks that can threaten the security of their in-use data containing devices – their office computers, servers, and websites – and they have safeguards in place to minimize any threat of illegal access. Nowadays many companies are even insuring themselves against cyber-attacks. But did you know that your end of life data containing devices could pose an expensive threat to your business as well? Most of the business owners and managers that we … [Read more...]