Written policy is essential to a successful cybersecurity program. Without it, employees can misbehave and get away with it. Response and recovery times in the event of a cyber incident will be drastically longer. The mindset of leadership will not be set in stone. Policy guides employee behavior, establishes leadership’s attitude toward cybersecurity, and addresses how data is to be stored, processed, and protected.
Technology companies come and go, but Bit by Bit backs its service with 30 years of experience helping businesses achieve their goals with reliable IT solutions and support. We were established in 1987 as a database application development and networking company, and since then we’ve evolved into a full-service IT firm and leader in delivering powerful and cost-effective technology solutions. visit our site at www.bitxbit.com
Thursday, February 21, 2019
United States - Valley Hope Association
![]() |
Exploit: Database leak.
Valley Hope Association: Kansas-based group of addiction treatment centers. Risk to Small Business: 1.777 = Severe Customers Impacted: 70,000 patients. >> Read full details on our blog. |
Wednesday, February 20, 2019
How to save your IT system from its own users: Zero Trust Browsing
How to save your IT system from its own users: Zero Trust Browsing
2017: The Year of Cryptojacking. 2018: The Year of Ransomware. 2019? It’s shaping up to be the Year of Phishing.
Historically, we’ve labeled phishing as a nuisance that only a select few fall for. However, the increasing sophistication of social engineering, along with a gradual evolution of phishing techniques, have leveled the game. For example, hackers have realized the importance we place on SSL certification, and have found ways to exploit it in order to give us a false sense of reassurance. Browsers such as Edge, Chrome, and Firefox have created advanced filtering techniques, but they are still unable to identify 10-25% of phishing sites...
Dark Web ID Trends:
Dark Web ID Trends:Top Source Hits: ID Theft Forums (98%)
Top Compromise Type: Domain (99%)
Top Industry: Service Provider
Top Employee Count: 1 - 10 Employees (96%)
Top Compromise Type: Domain (99%)
Top Industry: Service Provider
Top Employee Count: 1 - 10 Employees (96%)
Tuesday, February 19, 2019
United States - Graeter's Ice Cream
![]() |
Exploit: Malware on website checkout page.
Graeter’s Ice Cream: Regional ice cream brand based in Cincinnati. Risk to Small Business: 1.888 = SevereCustomers Impacted: Approximately 12,000. >> Read full details on our blog. |
Monday, February 18, 2019
Subscribe to:
Posts (Atom)
-
Windows 10 End-of-Life: Why You Must Upgrade Now to Stay Secure and Compliant Microsoft has officially announced the end of support for Win...
-
What is SOC-as-a-Service? By Robert Blake Having a Security Operations Center (SOC) in-house is expensive for the average business. Large ...
-
In today’s digital-first world, non-profit organizations are under increasing pressure to secure sensitive data, streamline operations, and ...


