Tuesday, August 11, 2020

Covid phone scam

Apparently, we need to prepare for these phone calls ...just in case 🙄
‘Good morning, According to our system, you are likely to have been in close proximity to someone who has tested positive for COVID-19. This means that you now need to self-isolate for 7 days and take a COVID-19 test.'
'OK. Can you tell me who that person was?'
'I'm not able to tell you that. That is confidential information.'
'Right. Um... so ....'
'But you do need to be tested within the next 72 hours. So can I just get the best mailing address so that we can send a kit to you?'
'Ok (gives address)'
'Thank you - and I just need to take a payment card so that we can finalize this and send the kit to you.'
'Sorry - a payment card? I thought this was all free?'
'No - I'm afraid not. There is a one-off fee of $50 for the kit and test results. Could you read off the long card number for me, please, when you're ready.'
'No - that's not right.
'I'm afraid it is. Can you give me the card number please - this is very important, and there are penalties for not complying.'
Puts the phone down.
This is how scammers work. And vulnerable people will fall for it.”
Don't fall for it...! COPY and PASTE
watch out ...🤬
Tell our elderly.

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

Monday, August 3, 2020

What is a Network Security Audit and Why Do I Need One?


As a business owner, you know that data security is one of your most vital concerns. You know that a single data breach could erode the trust of your customers, and that repeated breaches could subject you to fines or even put you out of business.

As a result, you have taken steps to lock down your network, from requiring strong and unique passwords and frequent password changes to installing firewalls and security software to keep the bad guys at bay. And while those are all crucial steps on the road to cyber security, they may not be enough to safeguard your network infrastructure and the massive amounts of proprietary and customer data it contains.

You may think that your network is as secure as it can be, but without a formal audit you can never know for sure. A network security audit is an important next step for every business owner, and the sooner you conduct one the better off you and your business will be.

What is a Network Security Audit?
A network security audit, also known as a network security assessment, is a formalized process during which the entire data infrastructure is carefully evaluated. During the process, previously unknown vulnerabilities or weak spots may be uncovered, and each one of those will be addressed once the formal assessment has been completed.

Once the network security audit is over, a formal list of recommendations will be made. These points will then be followed up on, either by the internal IT staff at the company, by the organization that conducted the audit or by an outside managed IT service provider. After these deficiencies have been addressed, a follow up audit may be conducted to ensure that all vulnerabilities have been adequately addressed.

The Many Benefits of a Network Security Audit
Subjecting your network infrastructure to a formal security assessment may seem like a cumbersome process, but the many benefits of the audit make it more than worthwhile. If you are running your business and simply hoping for the best, it is only a matter of time until a ransomware demand, hacker attack or security breach comes your way. These threats are not going away; if anything they are getting worse, and you cannot afford to fly blind in such a dangerous environment.

If you have not yet conducted a formal network security audit of your network, now is the time to get started. Here are some of the benefits of having your network infrastructure professionally evaluated.

   Regulatory compliance - Some types of businesses, including those operating in the governmental or healthcare space, may be required to undergo regular network security assessments and intrusion detection testing.

   Finding hidden vulnerabilities - Even if you have secured your network against all known threats, there may be other dangers hidden in plain sight. A network security audit can uncover those previously unknown vulnerabilities and address them.

   Enhancing the security of cloud storage accounts - If your business has moved to the cloud, conducting a formal network security assessment can enhance the value and safety of those stored files.

   Strike a balance between top security and easy access for employees - Finding the right balance between network security and usability is no easy task, but a professional network assessment can help a lot.

   Take advantage of specific expertise - You are an expert at running your business, but you are probably not a tech guru. When you schedule a network security assessment, you gain access to the specific expertise needed to keep you and your data safe.

   Employee education - The members of your staff should be the first line of defense in your cyber security strategy, not the weakest links in the chain. Investing in a formal network security assessment is a great way to educate workers on the value of data protection and their vital role in the process.

No matter where your business operates or what its niche, you have a vested interest in the protection of your network and the data it contains. With data breaches almost a daily event, it has never been more important to protect the information with which your business has been entrusted.

By conducting a formal data security assessment, you can decrease the odds of a data breach, educate your workers on the growing dangers and shore up your cyber defenses. If you have not yet conducted such an audit, now is the time to get started.

by
Robert Blake


For More information contact Bit by Bit 877.860.5831 x190




Bit by Bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

Wednesday, July 29, 2020

BBB Newsletter: Avoid Trouble, Update Your Passwords!

Saturday, July 25, 2020

Wednesday, July 22, 2020

Multifactor Authentication is a Security Must-Have in 2020


Today’s risk landscape is more complicated than ever. There’s a new danger to your systems and data lurking around every corner, and a new solution that you need to buy to mitigate it. Third-party data breaches are a constant worry not to mention the risk that comes from staff password recycling, or unintentional insider threats like falling for a phishing attack. So how can you provide an extra layer of security against most risks without spending a fortune? 
Multifactor authentication (MFA). Adding MFA on every user account us a fast, easy way to secure your company’s entry points. Even if cybercriminals are able to obtain a credential that would allow them access to your systems and data from an outside source, that credential isn’t going to do them any good without an authentication token like a code that’s sent to the real account holder’s cellphone. 
It’s wise to put a complete suite of digital risk protection solutions in place but you may need to economize. That makes cost-effective, multifunctional tools like Passly the ideal choice. By combining MFA with single sign-on, remote management, and seamless integration with over 100 common business applications, Passly gives a high return on investment and a high level of protection – because no one can afford a data breach in this economy.   

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863

Does Remote Work Really Increase Cyberattack Risks?

It’s long been debated whether remote work demonstrably increases the risk of a cyberattack. As we move through the pandemic, we’re all taking part in an unexpected experiment in remote working – and we’re just starting to see if the increased risk that’s often associated with remote work is fact or fiction

The third Global Threat Report is out, and it’s got some important data to consider when debating the risk of remote work or securing a remote workforce. According to researchers, 91% of executives surveyed believe that remote work has placed their companies at higher risk for a cyberattack, with a high incidence of phishing attempts named as the biggest factor that drove that opinion.  
The study, conducted in March and April of 2020, found that 85% of the surveyed executives (chief information officers, chief technology officers, and chief information security officers) felt that breach risks were too high because their workforce had not been properly equipped, trained, or secured to work from home, with 28% citing severe known gaps in security.
As the pandemic continues to affect the way that business is done, companies need to take adequate measures to secure their remote workforce long term. Our resource package “Remote Working Cybersecurity” can help with a checklist and more! DOWNLOAD IT>> 
Over 29% of the surveyed executives cited a lack of multifactor authentication as the biggest threat facing their organization, rising to 50% for companies in the financial services sector, and 46% for companies with 251-500 employees. COVID-19 related malware was reported by 43% of respondents as the biggest perceived threat organizations with 50-250 employees. 
Don’t wait to deploy essentials like multifactor authentication (MFA). By adding a solution like Passly to your security stack, you provide one affordable tool that packs a huge security punch by combining MFA, single sign on, remote management, seamless integration with over 100 applications, and easy deployment in days, not weeks.   
Companies should be proactive to avoid future headaches. By adding MFA and the remote workforce support power of our digital risk protection platform now, businesses can be ready for tumultuous times and avoid hazards like scrambling for added security or a costly data breach as we continue to grapple with the global pandemic. 

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5863