When assessing the risks of a security breach, it helps to know what you are up against. Cyber threats can come in many different forms. Understanding the nature of these threats will help us to be more prepared to defend against them. Actually, there is a long list of potential threats — too many to cover here. To give you some
Your company’s mission is to provide products and services — but there’s a lot more to it. You can make all the widgets that you want, but if you don’t protect them you can lose everything. Ignoring potential threats and vulnerabilities will only enable those with evil intentions to compromise your business. That’s why it’s important to make sure everyone in
If you are intelligent and creative, you can very often find a way to accomplish things that others can’t. Some talented people become trailblazers in their field, consistently meeting goals that they have set for themselves. But left to ourselves, doing very well can often become a hit-or-miss proposition. To bring everyone up to speed and improve quality across industries, many
When it comes to cybersecurity, there is not much room for error. Those who fail to adequately secure their IT environment, including remote access employees, may regret their neglect. As more people are working from home rather than at the office, cyber criminals are taking advantage of any weaknesses that may become apparent in the home worker’s IT defenses. Barracuda Networks
Everyone knows the importance of passwords. From ancient days, secret passwords have been used to authorize entry for those who know them. Those who could not accurately state the password were restricted access and may even have been considered enemies. That’s the idea behind the use of passwords in the field of computing. The problem is that many passwords are too
You may be bored enough to read the cereal box some morning when you’re eating breakfast, but it’s not particularly exciting literature. Neither is network documentation. But like the cereal ingredients’ description on the box, good documentation will tell you exactly what’s in your network. And there are plenty of reasons you want your documentation to be good — whether it’s
Every company with remote workers should follow a set of best practices for remote access security.
You are unique in this world, with an identity that no other person has. But sometimes you are called upon to verify your identity in order to access certain services. An identification card may be required for you to cash a check, pick up a prescription, or enter a secure building. In the IT world, identity and access management (IAM) is a discipline
Small businesses are a growing target for cyber-attacks. In fact, the Verizon 2019 Data Breach Investigations Report (DBIR) reports that small businesses comprise 43% of cyber-attack victims.
If you have a fleet of phones in use by your employees out in the field, then you basically have an added level of exposure for each of those phones.