The Dirty Loophole That Lets Insurance Companies Refuse to Cover a Cybercrime Theft in Your Business

As hacking hit the headlines in the last few years — most recently the global hack in May that targeted companies both large and small — insurance policies to protect businesses against damage and lawsuits have become a very lucrative business indeed. Your company may already have cyber insurance, and that’s a good thing. But that doesn’t mean that you don’t have a job to do — or that the insurance will cover you no matter what.

When you buy a car, you get the warranty. But in order to keep that warranty valid, you have to perform regular maintenance at regularly scheduled times. If you neglect the car, and something fails, the warranty won’t cover it. You didn’t do your job, and the warranty only covers cars that have been taken care of.

Cyber insurance works the same way. If your company’s IT team isn’t keeping systems patched and up to date, taking active measures to prevent ransomware and other cybercrime attacks, and backing everything up in duplicate, it’s a lot like neglecting to maintain that car. And when something bad happens, like a cyber attack, the cyber insurance policy won’t be able to help you, just as a warranty policy won’t cover a neglected car.

Check out this real life policy exclusion we recently uncovered, which doesn’t cover damages “arising out of or resulting from the failure to, within a reasonable period of time, install customary software product updates and releases, or apply customary security-related software patches, to computers and other components of computer systems.” If your cyber insurance policy has a clause like that — and we guarantee that it does — then you’re only going to be able to collect if you take reasonable steps to prevent the crime in the first place.

That doesn’t just mean you will have to pay a ransom out of pocket, by the way. If your security breach leaves client and partner data vulnerable, you could be sued for failing to protect that data. When your cyber insurance policy is voided because of IT security negligence, you won’t be covered against legal damages, either. This is not the kind of position you want to be in.

All of this is not to say that you shouldn’t have cyber insurance, or that it’s not going to pay out in the case of an unfortunate cyber event. It’s just a reminder that your job doesn’t end when you sign that insurance policy. You still have to make a reasonable effort to keep your systems secure — an effort you should be making anyway.

Posted in eTechTip - AP | Tagged | Leave a comment

The Most Common Ways Hackers Access Your Network

You are under attack. Right now, cybercrime rings in China, Russia, and the Ukraine are hacking into small businesses like yours to steal credit cards, client information, and swindle money directly out of your bank account. Some are even being funded by their own government to attack American businesses, and half of all cyberattacks are aimed at small businesses. The National Cyber Security Alliance reports that one in five small businesses have been victims of cybercrime in the last year. It’s critical that you protect yourself from the following 10 vulnerabilities.

  1. Poorly trained employees are the biggest risk. It’s common for an employee to infect an entire network by opening and clicking a phishing email designed to look like legitimate correspondence from a trusted source. If they don’t know how to spot infected emails or online scams, employees can easily compromise your entire network.
  2. We strongly recommend an acceptable use policy that limits the websites employees can access with work devices as well as work material they access with personal devices. We can easily set up permissions that regulate which websites your employees access and what they do with company-owned devices, even granting certain users more freedom than others. You also need to detail what an employee can or cannot do with personal devices when taking work home.
  3. Weak passwords are bad news; passcodes should be at least eight characters long with both lower and uppercase letters and include symbols and at least one number. On a company cellphone, requiring a passcode makes stolen devices harder to compromise. Again, this can be enforced by your network administrator so employees don’t get lazy and put your organization at risk.
  4. If your networks aren’t patched, new vulnerabilities (which are common in programs you already use, such as Microsoft Office) can be exploited by hackers. It’s critical that you patch and update your systems frequently. If you’re under a managed IT plan, this can be automated so you never miss an important update.
  5. Are you backed up in multiple places? Aggressive ransomware attacks, where a hacker holds files for ransom until you pay a fee, can be foiled by backing up your data. You won’t have to pay a crook to get them back. A good backup will also protect you against accidental deletion and natural disasters, and it should be automated.
  6. One of the fastest ways cybercriminals access networks is by duping employees to download malicious software by embedding it within downloadable files, games, or other innocent-looking apps. This can largely be prevented with a secure firewall and employee training and monitoring.
  7. Not all firewalls are created equal. A firewall blocks everything you haven’t specifically allowed to enter or leave your network. But all firewalls need monitoring and maintenance, just like all devices on your network, and a weak one does you little good. This, too, should be done by your IT person or company as part of their regular, routine maintenance.
  8. Many hackers exploit your devices when you connect to public Wi-Fi, getting you to connect to their Wi-Fi instead of the legitimate public one. Always check with a store or restaurant employee to verify the name of the Wi-Fi they are providing. And never access financial or medical data or enter your credit card information when surfing public Wi-Fi.
  9. It may be one of the oldest tricks in the book, but phishing emails still work. The goal is to get you to download a virus by clicking a link or getting you to enter your login information on a clone of a legitimate website.
  10. In 2009, social engineers posed as Coca-Cola’s CEO, persuading an executive to open an email with software that infiltrated the network. Social engineering is another old-school tactic, but, like phishing, it works well. Hackers pretend to be you, and people often fall for it.

If you are concerned about cybercriminals gaining access to your network, then call us to learn more about implementing a managed security plan for your business. You’ve spent a lifetime working hard to get where you are and have earned every penny and every client. Why risk losing it all? Get the facts and be certain your business, reputation, and data are protected.

Posted in eTechTip - PC | Tagged | Leave a comment

The Hidden Dangers Of “Shadow IT” To Your Business

We all know that using information technology — programs, apps, or internet browsing — carries a certain amount of risk. Nobody wants to have their secure data compromised, but technology brings enough benefits that the risk is worth it. So you vet certain systems, you establish protocols, you update and patch your software, and you keep track of the technology used at work.

But what about the technology your employees are using that isn’t part of your official plan? We’re talking about messaging apps, Excel macros, cloud data storage, collaboration spaces, and even hardware like USB drives, smartphone storage, and personal laptops that you don’t control.

We call this “shadow IT,” and that’s a whole lot of potential holes to cover!

Even if you ignore the dangers of having accounts hacked, data stolen, and websites vandalized, shadow IT can be very inefficient. You don’t control it, so you don’t know where important information is or what work is being done. It makes it hard to avoid duplication of efforts and even harder to manage employee productivity. What are you to do?

Well, your gut reflex might be to “crack down” on using unauthorized technology for work purposes. Swallow that reaction, though — you can’t stop it, and you’ll just harm morale. You’ll also drive usage even further underground; your people won’t be honest with you for fear of reprisal. That means that if a compromise occurs, you’ll be the last to know.

Instead, keep an eye on the situation. Make it clear that you support employees using the tools they need to get the job done, as long as they let you know what those tools are. If your people start using cloud storage apps, that’s fine — but have them explain how they’ll keep that data secure. Just as you empower them to find their own tools, empower them to keep things secure.

You probably can’t come up with a list of all the shadow IT that’s being used at your work, but you can keep an eye on the trends as they develop. Research the technology that’s being used and watch the headlines for data breaches or other compromises.

In some cases, you will have to crack down on specific apps, programs, or devices being used at your work; they’re just too risky. If you’ve worked with employees and fostered good communication, this shouldn’t be an issue. Remember to avoid blaming employees when shadow IT becomes a problem — especially if they bring the issue to your attention themselves. There’s nothing wrong with asking your people to stop using a specific program or device, as long as you’re transparent and have good reasons.

Last, but not least, try to look on the bright side. Shadow IT may be a little risky, but it also presents opportunities for employees to drive productivity and try out new best practices. If they’re using a piece of technology, it’s probably doing something that the currently “approved” tech is not. They’re also showing self-starter tendencies and trying to do their job better. And that’s always something you should support!

Posted in eTechTip - AP | Tagged | Leave a comment

How To Keep Your Employees From Leaking Confidential Information

Back in 2014, Code Spaces was murdered. The company offered tools for source code management, but they didn’t have solid control over sensitive information — including their backups. One cyberattack later, and Code Spaces was out of business. Their killer had used some standard techniques, but the most effective was getting an unwitting Code Space employee to help — likely via a phishing attack.

When it comes to cybercrime that targets businesses, employees are the largest risks. Sure, your IT guys and gals are trained to recognize phishing attempts, funky websites, and other things that just don’t seem right. But can you say the same thing about the people in reception, or the folks over in sales?

Sure, those employees might know that clicking on links or opening attachments in strange emails can cause issues. But things have become pretty sophisticated; cybercriminals can make it look like someone in your office is sending the email, even if the content looks funny. It only takes a click to compromise the system. It also only takes a click to Google a funny-looking link or ask IT about a weird download you don’t recognize.

Just as you can’t trust people to be email-savvy, you also can’t trust them to come up with good people still use birthdays, pet names, or even “password” as their passcodes — or they meet the bare-minimum standards for required passcode complexity. Randomly generated passcodes are always better, and requiring multiple levels of authentication for secure data access is a must-do.

Remember, that’s just for the office. Once employees start working outside of your network, even more issues crop up. It’s not always possible to keep them from working from home, or from a coffee shop on the road. But it is possible to invest in security tools, like email encryption, that keep data more secure if they have to work outside your network. And if people are working remotely, remind them that walking away from the computer is a no-no. Anybody could lean over and see what they’re working on, download malware or spyware, or even swipe the entire device and walk out — all of which are cybersecurity disasters.

Last but not least, you need to consider the possibility of a deliberate security compromise. Whether they’re setting themselves up for a future job or setting you up for a vengeful fall, this common occurrence is hard to prevent. It’s possible that Code Space’s demise was the result of malice, so let it be a warning to you as well! Whenever an employee leaves the company for any reason, remove their accounts and access to your data. And make it clear to employees that this behavior is considered stealing, or worse, and will be treated as such in criminal and civil court.

You really have your work cut out for you, huh? Fortunately, it’s still possible to run a secure-enough company in today’s world. Keep an eye on your data and on your employees. And foster an open communication that allows you to spot potential — or developing — compromises as soon as possible.

Posted in eTechTip - PC | Tagged | Leave a comment

TWITTER might be building a paid subscription service for “power” users.

TWITTER might be building a paid subscription service for “power” users. According the The Verge, the social media giant is surveying users to determine the size of a market for pay-to-play tweeting. This would mean a more robust platform of tools for marketers, journalists, and others who want the most from Twitter. This premium tool set will provide valuable viewing, posting, and signaling tools like alerts, trends and activity analysis, advanced analytics, and composing and posting tools all in one customizable dashboard. It will be designed to make it easier than ever to keep up with multiple interests, grow your audience, and see even more great content and information in real-time. This comes at a rough time for Twitter, and any potential influx of revenue has to be a welcome though.

TheVerge.com March 23, 2017


Electric car charging towers could replace gas stations, one day. THE CHARGING TOWER is a new concept that Digital Trends recently reported on. The idea is to replace current gas stations with charging stations in the future as electric cars become more popular. Stacking up cars like dominoes, the tower looks more like a parking tower than a gas station. This is important because electric car technology seems to indicate that charging will take hours longer than a standard “gasup” takes today.

DigitalTrends – April 6, 2017


Microsoft slips by Apple to grab tablet satisfaction honors. MICROSOFT won the J.D. Power tablet survey, as reported by Mashable. Although the “tablet wars” of the past aren’t as hot as they used to be, it’s still an upset (albeit a close one) for Apple, who dominated the tablet market for years. Microsoft tablet functionality won out over Apple’s iPad; the non third-party keyboard probably helped with that. But Microsoft also won in the design category, which has to sting. Surprising nobody, LG, Asus, Samsung, and Acer came in far behind Apple and Microsoft.

Mashable.com April 7, 2017


Panther Drone Delivers Package by Air and Land. PANTHER DRONES strutted their stuff recently with capability to fly and roll along on land, delivering packages with aplomb. Similar to military-style land and-air drones, the Panther has a few advantages when it comes to residential delivery — like avoiding air hazards such as trees and power lines. A four-wheeled drone’s first aerial package delivery test showed off a special touch by also driving up to the doorstep of its pretend customer. That capability to deliver by both air and land makes the Panther drone an unusual competitor in the crowded drone delivery space. But the drone’s limited delivery range may pose a challenge in competing against the delivery drones of Google and Amazon. Unfortunately, the Panther is relatively heavy, so it has a limited range compared to other prospective delivery drones.

Discovery.com March 30, 2017

Posted in eTechTip - AP | Tagged | Leave a comment

Use This 9-Step Checklist To Ensure Your Data Is Safe, Secure And Recoverable

Yet how could you possibly relax if some random bit of malware, software glitch or cyber-attack catches you off guard just as you’re walking out the door? A well-designed secure computer network gives you the confidence that “all systems are go,” whether you’re having fun in the sun, or just getting things done with your team.

Here’s a quick nine-step checklist we use to ensure that a company’s computer network, and the data for that business, is safe and secure from disruption, if not absolute devastation:

  1. A written recovery plan. Simply thinking through what needs to happen when things go south, and documenting it all IN ADVANCE, can go a long way toward getting your network back up and running quickly if it gets hacked, impacted by natural disaster or compromised by human error.
  2. Have a clear communication plan. What if your employees can’t access your office, e-mail or phone system? How will they communicate with you? Make sure your communications plan details every alternative, including MULTIPLE ways to stay in touch in the event of a disaster.
  3. Automate your data backups. THE #1 cause of data loss is human error. If your backup system depends on a human being always doing something right, it’s a recipe for disaster. Automate your backups wherever possible so they run like clockwork.
  4. Have redundant off-site backups. On-site backups are a good first step, but if they get flooded, burned or hacked along with your server, you’re out of luck. ALWAYS maintain a recent copy of your data off-site.
  5. Enable remote network access. Without remote access to your network, you and your staff won’t be able to keep working in the event that you can’t get into your office. To keep your business going, at the very minimum, you need a way for your IT specialist to quickly step in when needed.
  6. System images are critical. Storing your data off-site is a good first step. But if your system is compromised, the software and architecture that handles all that data MUST be restored for it to be useful. Imaging your server creates a replica of the original, saving you an enormous amount of time and energy in getting your network back in gear, should the need arise. Without it, you risk losing all your preferences, configurations, favorites and more.
  7. Maintain an up-to-date network “blueprint.” To rebuild all or part of your network, you’ll need a blueprint of the software, data, systems and hardware that comprise your company’s network. An IT professional can create this for you. It could save you a huge amount of time and money in the event your network needs to be restored.
  8. Don’t ignore routine maintenance. While fires, flooding and other natural disasters are always a risk, it’s ever more likely that you’ll have downtime due to a software or hardware glitch or cyber-attack. That’s why it’s critical to keep your network patched, secure and up-to-date. Deteriorating hardware and corrupted software can wipe you out. Replace and update them as needed to steer clear of this threat.
  9. Test, Test, Test! If you’re going to go to the trouble of setting up a plan, at least make sure it works! An IT professional can check monthly to make sure your systems work properly and your data is secure. After all, the worst time to test your parachute is AFTER you jump out of the plane.

Be certain that you have all 9 steps fully covered with
our FREE Disaster Recovery Audit.

Contact us at [YOUR PHONE NUMBER] or [YOUR COMPANY E-MAIL ADDRESS], or visit [YOUR DEDICATED URL] to schedule our Disaster Recovery Audit FREE of charge, now through May 31. Contact us TODAY to get scheduled!

Posted in eTechTip - PC | Tagged | Leave a comment

4 Battle-Tested Tips To “FITE” Spam Attacks

You’ve got all points covered with fail-safe anti-malware and spam protection… Now you can kick back, breathe a sigh of relief and rest assured you’ll be spared any kind of devastating cyber attack, right?

Wrong.

No matter how “bomb-proof” your devices and software, you’ll always have weak points wherever people interact with your network. Mistakes happen and even the smartest among us can be deceived. Cyber thugs know this and constantly barrage your company’s email server with ever more devious ways to get through.

Their attacks are constant, and getting worse…

Alarmed to see an email that appears to be an overdue notice from the IRS, Robert in accounting clicks… Barbara, your receptionist gets an email from what appears to be a social media connection asking her to click … Bill in engineering just opened an infected file in Dropbox that he thought was a document from a colleague… Before you can blink, company files are locked and a ransom note appears…

Scammers constantly devise new and more devious ways to get people to click infected links. With credible looking website logos, URLs and messaging, emails can appear perfectly legitimate to the unwary. That’s why email is still a top weapon of choice for cybercriminals.

What’s particularly troubling is that the malware it delivers via booby-trapped emails can infect not only the victim’s machine, but your entire network as well. And once a network is infected, the virus can be very hard to detect.

So what can you do? “FITE” back! Here’s how:

Filter. Most people can identify a malicious email. But you don’t want your team wasting countless hours deleting intrusive messages. And while a spam filter can help mitigate the problem, none are 100% effective.

In fact, performance varies widely among spam filters. Look for the highest degree of accuracy in identifying spam, with the least number of false positives. Select a filter that’s also easy to use and won’t bog down your system.

Identify. Watch for tip-offs that an email may be spam if 1) you don’t know the sender, 2) you’re asked for a password, money or account information, or 3) you detect anything fishy about the sender, subject line or body of the email.

Other things to watch for include email from someone you don’t know, subject line and body content that don’t match, deliberate misspellings (such as “docum*nt”), an offer that seems too good to be true (It probably is…) and warnings about a computer virus.

Think before taking action. If you don’t know the sender, don’t even open the email. By opening a spam email, you are signaling to the sender that your email address is active. More spam is sure to follow.

If the email looks at all suspicious, DO NOT CLICK any links or download any documents. If it’s obviously spam, delete it or mark it as spam. If you’re not sure, verify with the sender by separate email or phone call before clicking or downloading anything.

Keep your email address private and read privacy statements before revealing it. Use an alias when providing your email address to commercial sites to keep your personal address from being shared.

Educate. Don’t let untrained users into your network who are not aware of the dangers of email spam. Train your team in best practices. Remember, they’ll benefit as well. After all, who wants to lose an important personal document or family photo due to an ill-advised click?

As spammers become ever more sophisticated, the threat goes beyond mere annoyance. Your company’s data and financial security are at risk. Now is the time to update your spam protection practices. It’s far less costly than dealing with the aftermath of an attack.

When was the last time your spam protection program had a checkup?

Through the end of May, we will provide a FREE Spam Protection Checkup to the first seven companies in the [YOUR CITY] area that request it. Visit [YOUR COMPANY WEB PAGE] or contact us today at or [YOUR COMPANY email ADDRESS FOR CUSTOMER INQUIRIES] to reserve yours while you still can. DO IT NOW… before a ransom demand — or worse — becomes a problem.

Posted in eTechTip - AP | Tagged | Leave a comment

7 Ways To Dodge A Data Disaster

You stride into the office early one Monday morning. You grab a cup of coffee, flip on your computer and start checking e-mail…

A note pops up that rivets your attention:

“Your files have been encrypted. Send $5,000 within five days or they will all be destroyed.”

You start sweating as your throat constricts and your chest tightens. Sure enough, every time you try to open a document, the same message appears. Your phone rings. It’s Bob in accounting, and he’s having the same problem. All files across your entire network have been encrypted. You contact the local police. They suggest you call the FBI. The FBI says they can’t help you. What do you do next?

  1. You pay the five grand, desperately hoping you’ll get your data back, or…
  2. You calmly call your IT pro, who says, “No problem, your backups are all current. No files were lost. Everything will be restored by noon, if not sooner.”

If your answer is “b,” you breathe a sigh of relief and get back to work as your backup plan kicks in…

Ransomware attacks are more common than ever, especially at smaller companies. That’s because small companies make easy marks for hackers. The average small business is much easier to hack than high-value, heavily fortified targets like banks and big corporations. According to Time magazine, cybersecurity experts estimate that several million attacks occur in the US alone every year. And that figure is climbing.

So how can you make sure you never have to sweat a ransomware attack or other data disaster? One sure solution is having a solid backup plan in place. When all your data and applications can be duplicated, you have plenty of options in the event of an attack. Here then are seven ways to make sure you’re in good shape, no matter what happens to your current data:

Insist on regular, remote and redundant processes. A good rule of thumb is 3-2-1. That means three copies of your data is stored in two off-site locations and backed up at least once per day.

Don’t cheap out on disk drives. Less expensive arrays that save money can leave your data at risk. Get features like a redundant power supply and hot spare disks.

Guard against human error. Make sure people doing backups know exactly what to do. Take people out of the loop and automate wherever possible. And watch for situations where backups aren’t a part of someone’s regular duties.

Check backup software settings routinely. When new software or updates are put into service, a change in the way the settings are configured can cause incomplete backups, or backups that fail. Do the people who maintain your backups include this on their regular to-do list?

Make sure critical files aren’t getting left out. As resources are added and priorities shift, documents and folders can get misplaced or accidentally left off the backup list. Insist on a quarterly or annual meeting with your backup management team to make sure all mission-critical files are included in your organization’s data recovery systems.

Address network issues immediately. Any component in your network that isn’t working properly can introduce another point of failure in your backup process. Every juncture in your network, from a misconfigured switch to a flaky host bus adapter, can hurt your backups.

Ask for help with your data backup and recovery system. You cannot be expected to be an expert in all things. Yet data is the backbone of your business – its protection and recovery should not be left to chance. Leverage the knowledge, skill and experience of an expert who stays current with all the latest IT issues.

Data Recovery Review Reveals Backup System Vulnerabilities

Don’t let your company become yet another statistic. Just one ransomware attack can result in a serious financial blow if you’re not prepared. Visit [TRACKING URL] TODAY or call [PHONE] by April 30 for a FREE Data Recovery Review, ordinarily a $300 service. We’ll provide you with a complete on-site assessment of your current backup system to check for and safeguard against any gaps that could prove financially lethal to your business.

Posted in eTechTip - PC | Tagged | Leave a comment

4 Must-Have, Low-Risk Cloud Solutions

Let’s face it, your business has more competition than ever. And they’ll eat you alive if you fall behind in today’s technology “arms race.”

Maybe your network needs greater security. Or you haven’t yet taken advantage of new cloud-based apps that help your team get more done in less time. Today, the action is in the cloud. And if you don’t know what’s out there, it’s just that much easier for competitors to pull ahead.

To help you stay on top, here’s a quick survey of four ways to put the cloud in your corner, along with examples of each.

Network Security

As devices on your network become more diverse and mobile, monitoring them in real time is absolutely critical to averting cyber-attacks. A good network-security tool probes for weak points and alerts you to potential threats. It can employ both hardware and software technologies. And today’s environment demands a bevy of checkpoints, from access control to WiFi-intrusion monitoring.

But how do you protect against threats that evade your monitoring efforts? Due to the recent spread of “fileless” malware, no antivirus program is 100% “bullet-proof.” However, you should be able to find basic software protection for around $40 per user. Look for features such as e-mail security, data loss prevention, network segmentation and behavioral analytics. And ideally, it scans quickly, takes up little space on your devices and may even be able to recover files encrypted by ransomware.

Collaboration

Giving your team the right cloud collaboration tools can be almost as good as giving them steroids… (Except, of course, it’s legal.) With the wide array of apps available today, the trick is finding the best one – or the best combination – for your company. Top contenders include Asana, Slack, Teamwork, Trello and Google Drive. These and similar apps can improve efficiencies in areas like project and task management, team communications and collaboration, brainstorming, document processing and storage, and more. And with cloud collaboration, you’re no longer restricted to bringing aboard talent from your local area alone.

Contracts & Accounting

Contracts and proposals that get bogged down in logistics can hurt monthly revenues. Is your sales team still asking customers to sign and fax back important documents? If so, they’re losing precious minutes every day. Then there’s the cost of storing and managing physical files. It all adds up. It’s no wonder so many companies now use electronic signature apps, such as DocuSign, Adobe Sign and RPost. They’ll let you manage the signing of important documents entirely online, and will encrypt and store files for you. Some are even court-approved and create a full audit trail.

For small business accounting, industry veteran QuickBooks, now with an online version, and upstart Xero can help you keep the books with relative ease. They both offer a clean, intuitive UI and affordable pricing with a comprehensive set of features. And, of course, being cloud-based, they can be accessed from a variety of locations, adding flexibility to your workforce.

Business Planning

Does your company need to prove its mettle to investors? You’d be hard-pressed to find a better all-in-one planning solution than Tarkenton GoSmallBiz. Created by NFL Hall of Fame quarterback Fran Tarkenton, it’s specifically built for small businesses. You get highly customizable and detailed data fields to help simplify your planning process. It then lets you create financial statements and projections without external spreadsheets. And as a subscriber to GoSmallBiz, you also get access to business-planning experts who can help you tweak your plans and proposals.

Free Cloud Utilization Audit Reveals Costly Gaps
In Your Company’s Cloud Technology

If you’d like to know how well your company is (or isn’t) taking advantage of today’s cloud, I’d like to offer you a FREE Cloud Utilization Audit, through the end of this month only. Normally priced at $300, this customized report could be worth thousands to you in both cost savings and increased efficiency for your business. We’ve helped dozens of companies set up and run cost-effective, powerful and secure cloud networks. For your FREE Cloud Utilization Audit, at no cost or obligation to you, visit [TRACKING URL], or contact us at [PHONE] or [E-MAIL] TODAY.

Posted in eTechTip - AP | Tagged | Leave a comment

“Lucky Charm” Keeps Hackers Out

Ralph’s been a good employee for you. Shows up on time. Gets the job done. Doesn’t hassle anybody.

He’s also a porn addict. When nobody’s looking, he’s visiting sites – on your network – that you’d be appalled to see. IF…you knew about them. Without careful monitoring and filtering, this kind of Internet use on your network can remain hidden.

Shocking? Hard to believe it could happen at your company? A survey by International Data Corporation (IDC) revealed that 70% of all web traffic to Internet pornography sites occurs during the work hours of 9 a.m. to 5 p.m. Ralph’s little visits may seem harmless, but they’re adding a serious level of risk to the financial health and security of your company.

Here’s how. A visit to an adult website can be tracked. And if a logged-in user’s identity is leaked, it can be embarrassing, to say the least, to that user. The user may even become a victim of “sextortion” or blackmail. Just ask any of the people who used Ashley Madison, a dating site for illicit affairs. When the site was hacked, users were suddenly at risk of having their indiscretions revealed. This gives cybercriminals a powerful lever to pressure an employee into revealing sensitive company data. Considering that 60% of security breaches start from within the company, you have to wonder what someone at risk of being exposed might do to keep their little secret, well…secret.

Let’s face it, if you’re not carefully monitoring and managing how your network is being used, your company’s data could be in serious jeopardy.

Content Filtering In Today’s Web 2.0 World

Whether you’re already monitoring user activity on your network or not, you need to stay vigilant about evolving risks. And content filtering is key. If your business is like many, you may already be doing some filtering. But is it enough? As technology evolves, hackers drum up ever stealthier ways to invade your network.

Cloud-based filtering, for example, becomes a must when mobile devices tap into your network. The old concept of a static, location-based “firewall” just doesn’t cut it anymore when your staff goes mobile.

Then there’s social media. It’s like a big window into the personal lives of your personnel. It lets cybercriminals “case the joint” before breaking in. For instance, when users log in to a personal Facebook account at work and talk about vacations, favorite hangouts or weekend activities, hackers can use that information for social engineering and other ploys.

The number of ways your network is exposed to potentially damaging content grows daily. It’s no wonder that 90% of companies and government agencies surveyed by IDC detected computer security breaches within the previous 12 months. Eighty percent of those organizations acknowledged financial losses due to these breaches. With odds like that against you, an up-to-date content filtering system could well be THE “Lucky Charm” that keeps your company, and your data, safe from all kinds of harm.

FREE Web And E-mail Usage Audit

Instantly Reveals If You Have A Problem

If you’d like a snapshot of where your employees are going online and how much time they’re spending surfing the net on non-work-related activities, I’d like to offer you a FREE Internet And E-mail Usage Audit worth $300. At no cost or obligation on your part, we’ll come by and install a special diagnostic program that will expose lurking threats due to inappropriate employee use of websites, e-mail and instant messaging.

I’m making this offer because I’d like to give you a bite-sized sample of our extraordinary customer service and proactive approach to protecting you and your organization. And to be perfectly clear, no matter what we may find during your audit, you are under no obligation to buy anything or ever use our services again.

However, there is a catch: we’d like to help every company in the [CITY] area eliminate this risk, but we’re only able to perform [NUMBER] audits per month. Call [PHONE] or visit [TRACKING URL] now, while you’re thinking of it. The five minutes you invest could save your company thousands of dollars in lost productivity, potential lawsuits and company resources.

Posted in eTechTip - PC | Tagged | Leave a comment
  • Categories

  • Categories

  • Archives