1.888.749.9800

Yearly Archives: 2018

  • Permalink Gallery

    ‘Tis the Season to Protect Your Identity: Online Shopping Security

‘Tis the Season to Protect Your Identity: Online Shopping Security

by Alayna Pehrson, content management specialist for Best Company, November 26, 2018

It’s the time of year when people start making both online and in-store purchases for their loved ones. When holiday deals appear, most people enjoy indulging the spirit of giving. Unfortunately, many identity thieves and cybercriminals don’t feel the same spirit and often target holiday shoppers.

According to a […]

By |November 27th, 2018|News & Events, Security Breach|Comments Off on ‘Tis the Season to Protect Your Identity: Online Shopping Security

Cybersecurity Tips for the Holiday Season

In my last post I offered tips to keep personal online holiday shopping safe and to help prevent fraud on any of your accounts. Today I’d like to offer small retailers some advice to make sure their IT infrastructure is up-to-date and ready to handle the holiday rush.

Before the holiday season kicks into high […]

By |November 15th, 2018|Blog, Security Breach|Comments Off on Cybersecurity Tips for the Holiday Season

Cybersecurity Do’s and Don’ts for the Holiday Season

As the holiday season quickly approaches, I thought it appropriate to share some tips I’ve talked about in the past to keep your online holiday shopping safe and to help prevent fraud on any of your accounts. That leads to my first tip:

  • Consolidate all of your online purchases onto a single credit […]
By |November 6th, 2018|Blog|Comments Off on Cybersecurity Do’s and Don’ts for the Holiday Season

Protect Your Network with these Three Steps

In addition to being a security consultant by trade, I am a Chief Warrant Officer for the Massachusetts Army National Guard, where I mentor incident handlers and senior leadership on offensive and defensive cyber warfare. In this position, I am regularly asked for advice on all things related to cyber. One recent query from a newly promoted […]

By |October 31st, 2018|Blog|Comments Off on Protect Your Network with these Three Steps

Protecting from Phishing and Spear-Phishing

SystemExperts Corporation is aware that many companies are seeing spear-phishing attempts where the emails purport to be from internal employees. We have also heard reports that compromised email accounts have been used to send spear-phishing emails to third-parties and the owner of the compromised accounts do not see the emails being sent on their behalf, nor the […]

By |October 15th, 2018|Blog, Security Breach|Comments Off on Protecting from Phishing and Spear-Phishing
  • Permalink Gallery

    Employers overlook a key ally in preventing cyberattacks: HR departments

Employers overlook a key ally in preventing cyberattacks: HR departments

by Caroline Hroncich, associate editor Employee Benefit Advisor, September 26, 2018

Everyone gets them — an email message that looks exactly like it came from a co-worker or a supervisor. It may come with a link that asks an employee to log in with a company username and password. To the untrained eye it seems harmless.

But employees need to […]

By |September 28th, 2018|News & Events|Comments Off on Employers overlook a key ally in preventing cyberattacks: HR departments
  • Permalink Gallery

    Employers overlook a key ally in preventing cyberattacks: HR departments

Employers overlook a key ally in preventing cyberattacks: HR departments

by Caroline Hroncich, associate editor, Employee Benefit News, September 24, 2018

Everyone gets them — an email message that looks exactly like it came from a co-worker or a supervisor. It may come with a link that asks an employee to log in with a company username and password. To the untrained eye it seems harmless.

But employees need to think […]

By |September 24th, 2018|News & Events, Security Breach|Comments Off on Employers overlook a key ally in preventing cyberattacks: HR departments

Crisis Management Centers and Cyber Security

I was asked to contribute to an article about 911 communications centers recently based on my experience with large crisis management centers (think the 2014 Boston Marathon bombing). Below are my responses to the questions:

What are the common vulnerabilities communication centers face?

24-hour crisis managements centers often have shared computers. I would expect that they conduct […]

By |September 24th, 2018|Blog|Comments Off on Crisis Management Centers and Cyber Security

How to Protect Your Security Online

I was recently asked a series of questions about how to protect your security online. I’d like to share the answers here – and please feel free to reach out if you have any comments.

1. How can you create the best passwords that are hacker-proof but easy to remember?  

The best passwords aren’t […]

By |September 11th, 2018|Blog, Security Breach|Comments Off on How to Protect Your Security Online

How Do You Define Success for a Cyber Security Team?

Is it risk reduction? Training employees? Fighting back against targeted attacks?

The easy answer to this question is to build a comprehensive and mature Security Program. The difficult part is identifying every critical component that make this a success. Remembering that any security program is only as strong as the weakest link, you must build […]

By |August 28th, 2018|Blog, Security Breach|Comments Off on How Do You Define Success for a Cyber Security Team?

The data security threat is complex and constantly changing

by Adam Muspratt, content editor, CX Network, August 16, 2018

Adam Muspratt, content editor for CX Network, interviewed several experts in cyber security. In this report Muspratt delves into data security and discusses how complex the threat is and the fact that it is constantly changing.

Data security in customer experience: Are CX teams cyber-aware?

Going into […]

By |August 27th, 2018|News & Events|Comments Off on The data security threat is complex and constantly changing
  • Permalink Gallery

    Business Continuity Plans and Disaster Recovery Plans (Part 2)

Business Continuity Plans and Disaster Recovery Plans (Part 2)

Comprehensive business continuity and disaster recovery plans are must-haves for companies of all sizes that are dependent on their systems to run their businesses. In Part 2 on this topic, I discuss factors that have to be considered when building a plan.

Preparing for a disaster can be a daunting task, involving many factors. A company will have […]

By |August 2nd, 2018|Blog|Comments Off on Business Continuity Plans and Disaster Recovery Plans (Part 2)
  • Permalink Gallery

    Business Continuity Plans and Disaster Recovery Plans (Part 1)

Business Continuity Plans and Disaster Recovery Plans (Part 1)

Comprehensive business continuity and disaster recovery plans are must-haves for companies of all sizes that are dependent on their systems to run their businesses.

The definition of a disaster is anything that can impact the continuation of business operations. Most people think disasters would just include major weather events (snowstorms, hurricanes, flood, and tornadoes), fire, […]

By |July 30th, 2018|Blog|Comments Off on Business Continuity Plans and Disaster Recovery Plans (Part 1)

Q&A On Reconstructing Data After a Disaster

I was recently asked about best practices for a business to reconstruct its data after a disaster by John Edwards, TechTarget. John included my tip noting that once a disaster involving data loss is identified, you must act fast to preserve your environment to prevent further damage, and to protect the archived data itself. Here are some addition […]

By |July 24th, 2018|Blog, Security Breach|Comments Off on Q&A On Reconstructing Data After a Disaster

Five data recovery planning steps to protect vital assets

by John Edwards, technology writer, TechTarget, July 19, 2018

Accurately restoring lost data after disaster strikes requires planning, patience and logic. If your goal is a smooth recovery process, here’s what you’ll need to know beforehand.

Disaster can strike any data center on any day. Money, time and effort enable physical IT assets to be fully restored — […]

By |July 23rd, 2018|News & Events|Comments Off on Five data recovery planning steps to protect vital assets