Monday, February 25, 2019

What we can do to stop putting our data at risk of identity theft

What we can do to stop putting our data at risk of identity theft
5 quick and easy tips for updating your data security
It’s safe to say that data breaches are one of the primary threats affecting the ways in which small businesses operate. All industries face the risk of exposing valuable personally identifiable information (PII) or protected health information (PHI). To compound the matter, innovations such as Internet of Things (IoT) become deeply integrated into operations and can create additional risk.
However, to mitigate even the most advanced cybersecurity concerns, we must begin by thinking simple and effective. Here are 5 steps for proactively preventing breaches and protecting your data in the event of a compromise:
1. Foster cybersecurity team buy-in
Consider implementing an incentive program for employees who detect significant vulnerabilities in cybersecurity. Create a workplace culture that values customer and employee privacy and offer continued education.
2. Make regular updates
Schedule timely updates and involve employees in the process by sending notifications and ensuring compliance.
3. Encrypt data
By making data unreadable for hackers, SMBs can dodge hefty fines and tarnished reputations in the event of a breach.
4. Backup data
By backing up your data onto multiple servers, you can prevent information from being lost in the case of a ransomware attack. Diversifying the format of how data is stored and keeping multiple copies that are secure offers additional protection.
5. Test cybersecurity protocols
By assessing vulnerabilities and conducting penetration testing, you can anticipate weaknesses in your security. Teaming up with security providers to stay constantly alert will offer the two-pronged benefit of preventing a breach from happening in the first place and being prepared pre- and post-incident.

Quick Start Guide to Dark Web Security



https://preview.hs-sites.com/_hcms/preview/content/7440928435?portalId=4331745&_preview=true&cacheBust=1550794851801&preview_key=zflscGba&from_buffer=false

Hi There,
Did you get the chance to check out our latest ebook?
The "Quick Start Guide to Dark Web Security" walks you through the mind of a cybercriminal, describing ways they can steal your information and hold it for ransom or sell it on the dark web.
Learn how to protect confidential data from being hacked. Do not delay. Your business could be next.
Learn More
  




Signature Image
Robert Blake Consultant
Bit by Bit Computer Consultants




Friday, February 22, 2019

In Other News:

In Other News:
MyFitnessPal and CoffeeMeetsBagel data go for sale on the Dark Web
After the breach of MyFitnessPal last year involving 150M user accounts, the data has finally been packaged up along with stolen credentials from 15 other websites to be sold on the Dark Web. The asking price? Less than $20,000 in Bitcoin...

Thursday, February 21, 2019

February Newsletter: Understanding How the Cloud Works





How will you recover after a cyber incident?


Dark web Trends

This week, Dunkin’ faces a 2nd credential stuffing attack, a Canadian photo-sharing platform discovers hack, a French cybersecurity society is compromised and Australian property data is leaked.
Dark Web ID Trends:Top Source Hits: ID Theft Forums (99%) 
Top Compromise Type: Domain (99%)
Top Industry: Medical and Healthcare
Top Employee Count: 1 - 10 Employees (94%)

What is the importance of written security policy?


Written policy is essential to a successful cybersecurity program.  Without it, employees can misbehave and get away with it.  Response and recovery times in the event of a cyber incident will be drastically longer.  The mindset of leadership will not be set in stone.  Policy guides employee behavior, establishes leadership’s attitude toward cybersecurity, and addresses how data is to be stored, processed, and protected.