Centrend

Author name: admin

5 Seemingly Innocent Download Habits Your Employees Must STOP Now To Avoid A Ransomware Attack

Once upon a time, you could install antivirus software and go about your merry way online and in your inbox, opening, clicking, and downloading files without care. Today, antivirus alone cannot and will not protect you, especially if you INVITE the hack by downloading a file that is infected with a piece of code designed to circumvent your security protocols. Whether it’s a personal computer, phone, or laptop you use for business, here are 5 things you need to STOP doing now to ensure you don’t get hacked. STOP downloading apps from unknown sources. There are thousands of free apps available online that are very tempting to download. Hackers are masters at curiosity and “clickbait” designed to nail you in a moment of weakness. To prevent rogue apps and programs from installing, configure your devices to disallow the installation of programs from unauthorized sources. On your phone, ONLY download apps from your device’s respective app store that are tested and forced to meet the store’s security and privacy requirements.Business owners: while I’m sure all of your employees are trusting souls, it IS possible (and recommended) to have business machines locked down, preventing your employees from downloading any applications (or files) that could harm you and compromise your security. STOP surfing the web unprotected, particularly when accessing downloads. This is particularly true if you are on public WiFi. Starbucks is not going to guarantee your Internet connection is safe, nor is any other business, restaurant, or location offering free Internet access. Talk to your IT company (that’s US!) about installing more than just antivirus, but endpoint protection solutions, like a VPN, that will “hide” you from cyber criminals and filter out nefarious websites and attacks so you CAN use public WiFi without the fear of inviting a hack. STOP opening and downloading files e-mailed to you without extreme caution. Phishing attacks via e-mail are still the #1 way hackers gain access to a network. It’s very common for an attacker to hack into someone’s e-mail and get their list of friends, colleagues, coworkers, and their boss to send e-mails that appear legitimate on “their” behalf, even using their actual e-mail – these are highly sophisticated phishing attacks. So, before you open or download ANY file e-mailed to you, make sure it was the one you were expecting. It’s far safer to use IT-managed file sharing like OnDrive, SharePoint, or Citrix ShareFile to send attachments. But the bottom line, if ANY file “feels” wrong or suspicious about a file download, including a weird extension or suspicious file name, CALL the person who sent it to verify. If it’s important, they can send it again. STOP downloading “bloatware.” It’s common for legitimate, reputable apps to sneak in other applications or toolbars you don’t need. They sell this as a sponsorship to make more money every time one of their users downloads an app. The best way to spot these is to look for checkboxes when installing that automatically opt you into services by default. So, before you hit “Next” and keep rolling to get your app installed, take a second to really read and review what you’re agreeing to when installing that new app. STOP downloading music, software, games, movies, and the like from websites like BitTorrent, RARBG, 1337x, and similar peer-to-peer file-sharing sites. It’s very common for file-sharing networks to be breeding grounds for hackers who post files infected with malicious software for people to download. Some of the ads on these sites are malicious as well. Don’t feel “safe” just because you have antivirus – because you’re not.  Business owners: after showing this to your team for both their work and personal devices, click here (https://calendar.app.google/jSA1tteBxFJKnJkX6) to schedule a quick 10-minute call to find out how we can implement security systems that will give you stronger protections against hackers and against employees who accidentally click on or download a malicious file. 

5 Seemingly Innocent Download Habits Your Employees Must STOP Now To Avoid A Ransomware Attack Read More »

How To Get More Productivity Out Of Every Employee (And Make Them Happier About It)

You’ve heard the phrase “Get with the program!” It’s often used as a direct order to someone to fall in line with the way things are supposed to be done at your company. The problem is, most business owners don’t have “a program” for employees to get with, and therefore they get wild and erratic results, as well as a lot less performance, output, and productivity, from each person they employ. Then everyone’s frustrated – you, because nobody is doing what you need them to do, and them, because they weren’t given clear instructions and guides on the work and results they are supposed to be doing. Given the current economic environment, with inflation still high, salary demands on the rise, and a potential hard recession looming, no business can afford to employ people who aren’t “with the program” anymore. To be clear, I’m not talking about a sweatshop, boiler-room “manual” of step-by-step instructions on every little thing you do in your office (although that may be necessary for some positions and tasks). I’m talking about a well-thought-out and clearly communicated set of RESULTS and EXPECTATIONS for each person in your company, so they can be extremely clear about what results they are supposed to be delivering for you. We call it a job scorecard. For example, is the purpose of your receptionist to “answer the phone” or is it to be the “director of first impressions,” ensuring that every client, prospect, or person calling your office is delighted by how they are treated and helped? To ensure every prospect is promptly connected with a salesperson and not left to wander in your phone tree or leave a voice mail for some unknown stranger, hoping for a callback? Most simply tell their assistant, “Answer the phone.” But even a rude, stupid, and willfully spiteful person can do that. Are you sure that’s what you want? Left to their own devices, some employees might do just that. How often have you called a company to talk to someone in “customer service” and they made you angrier and more upset than before you called in? My point exactly. So, step one is make sure every employee has a scorecard that clearly defines the following: Mission of the Position: What’s the purpose of that position? To increase sales? Delight customers? Prevent cancellations and churn? Develop clients and nurture repeat business? Start here when thinking of positions in your company. Key Results: Once you know the mission of the position, the next section you need to articulate is what key results that person is supposed to achieve in a way that’s measurable. For sales and marketing professionals, that’s easy. Secure $100,000 in new sales every month. Generate 10 qualified appointees/leads a week. In customer service, that might be a client “saves” or upgrades. On a service desk, like ours, it may be the speed of tickets cleared and customer satisfaction ratings. For leaders, it may be hitting certain revenue and profitability targets. To the best of your ability, give everyone at least one, but no more than three, key results they need to achieve. This takes the drama out of performance because if it’s measured, it’s not based on an opinion or anecdotal evidence. Specific Responsibilities: Next, make sure every employee has a list of specific actions, tasks, and responsibilities they must fulfill every day, week, month, quarter, and year. That way you avoid dropped balls and overlooked tasks because “no one told me I was supposed to do that.” Of course, if you’re clear on the outcomes a person needs to accomplish, the tasks nearly write themselves – after all, if the goal is to lower churn or increase sales, and employees are compensated that way, it’s infinitely easier to “motivate” them to do what’s necessary. Once you have these roles and scorecards, it’s helpful to share them with the entire team so everyone in the company understands what each person’s roles and responsibilities are. One way of sharing is in Microsoft Teams, where you can create Wikis, To-Do lists, file sharing, checklists, and chat to collaborate on projects that cross multiple departments and employees.  If you want help exploring how to use any of these tools in your company, click here to schedule a quick discovery call to see what’s possible. 

How To Get More Productivity Out Of Every Employee (And Make Them Happier About It) Read More »

Death By CHEAPNESS

Southwest Airlines’ recent fiasco that caused them to cancel over 16,700 flights, leaving people stranded across America, was the epitome of what’s happening with so many businesses right now across the US. A total and complete meltdown in service due to cheapness. During their busiest season, Southwest had to apologize for miscommunications that led to thousands of their customers being left stranded at airports. In Nashville, the airport police were telling checked-in travelers whose Southwest flights had been canceled that they would be arrested and physically removed for trespassing if they didn’t voluntarily leave the secure area because their boarding passes were no longer valid. Southwest employees were getting into verbal fights with obviously frustrated passengers, and very little communication was offered to passengers.  This little nightmare is estimated to have cost Southwest in the neighborhood of $725 million to $825 million, not to mention the loyalty of its customers and the damage to its reputation. Now, how’s the cost of that IT upgrading looking, Mr. CEO? Of course, nobody likes to invest money into IT upgrades and other “infrastructure” improvements. Money spent on a new website will drive new opportunities into your organization and (hopefully) give you an advantage over your competition. An easy investment. Money spent on office remodeling can be enjoyed every day, making employees happier and impressing clients who visit the office – another “easy” investment that delivers visible, tangible ROI instantly. But NOBODY likes to spend thousands of dollars on basic IT upgrades – UNTIL the meltdown brings your organization to a grinding halt at the worst possible time.  So, what should you spend on IT? According to a study done by TechTarget, companies generating less than $50 million in revenue spend an average of 6.9% of their total revenue on IT costs. But with regulatory compliance laws and cyber-attacks on the uptick, those budgets need to be increased in order to simply avoid a massive loss. Another survey, conducted by Capterra, showed that 75% of SMBs said they would be spending 10% to 20% MORE in 2023 on software and IT than in the previous year. A HUGE increase.  What are they spending it on? Cyber security being driven by compliance regulations and risk management is, without a doubt, one of the big areas of increase in spending. Another is workforce enablement to give employees more flexible (but secure) ways to work from home, on the road, or in the office. And finally, many companies are investing in any kind of technology that will reduce their need for and dependency on growing their workforce. Overhead walks on two legs – so, if a business can increase productivity without adding people, that’s always a win. Being “too cheap” in anything as a means to improve profits is a terrible long-term strategy. In fact, it’s a misnomer to even call it a “strategy.” It’s simply a short-term fix that should only be used in the most dire of times. Cutting IT spending to the quick gives a false sense of savings, as Southwest Airlines discovered. It’s not a problem until it IS. Then you have a giant, expensive mess to clean up that could cost you far more in losses than in money saved short term.  Book a 10-minute discovery call to see what you should expect to pay for IT in your area. 

Death By CHEAPNESS Read More »

“If I’m Going To Get Hacked Anyway, Why Bother Spending Money On Cyber Security?”

In his book The Road Less Stupid, Keith Cunningham makes this correct observation about succeeding in business: “I don’t need to do more smart things. I just need to do fewer dumb things.”  When it comes to cyber security, I see a lot of dumb decisions made by smart people based on gross ignorance about what can happen or the desire to stick their proverbial heads in the sand to avoid having to spend the money and time to protect their assets.      One of the biggest mistakes is thinking you won’t get hacked because you’re too small, or because you “don’t have anything the hackers would want.” Allow me to point out that you’re not too small to get hacked, but you are too small to make headline news. Millions of small businesses get hacked every year – they simply don’t talk about it because of the potential liability, bad PR, and loss of client and marketplace trust. They’re embarrassed.      Further, you’re right – hackers, for the most part, don’t want your stuff, unless you happen to have medical records, credit cards, social security numbers, etc. Those are very valuable digital assets that can be sold on the dark web marketplace – and cyber criminals are in it for the money. But more to the point, YOU want your stuff, so they’ll kidnap your information and hold it for a ransom to extort money from you. Kidnappers don’t steal a child because they want to start a family. They steal your children because YOU want your children and they know you’ll pay anything to get them back, safe and sound.      So it goes with ransomware. When all of your work files and e-mails go away, very few businesses can pick up from ground zero and keep operating without any losses. Perhaps the solo operator working from home, but certainly not a small business that has been operating for several years with multiple clients and employees producing work for clients.      Another excuse I’ll hear for not implementing cyber protections is, “Since I’m going to get hacked anyway, why bother spending so much money on cyber security? I’ll just get an insurance policy, back up my data, and take the hit.”      While that might sound logical, here’s why it’s a gloriously stupid plan…      Insurance companies are in business to make money, NOT pay out policy claims. A few years ago, cyber insurance carriers were keeping 70% of premiums as profit and only paying out 30% in claims. Fast-forward to today and those figures are turned upside down, causing carriers to make drastic changes in how cyber liability insurance is acquired and coverages paid. In fact, the CEO of Zurich Insurance Group recently predicted that cyber-attacks are set to become uninsurable.       Today, getting even a basic cyber liability policy requires you to prove you have certain security measures in place, such as multifactor authentication, password management, endpoint protection, and tested and proven data backup solutions. These carriers want to see phishing training and cyber security awareness training in place, and some will want to see a WISP, or written information security program, or a business continuity plan from your organization. Depending on the carrier, your specific situation, and the coverage you’re seeking, the list can be longer.      Also, hackers are onto your backup plan and create ransomware attacks to not only take your data but also corrupt your backup. The additional threat is that if you don’t pay, they’ll release your files online for all to see, including payroll information, ALL e-mail communications, client contracts, and more. Do you really want that in the hands of competitors and the general public? Insurance won’t cover that.      Bottom line: having cyber-protections in place cannot guarantee you will never get hacked, but it CAN dramatically prevent the damage done and absolutely will block the majority of attempts, preventing you from being low-hanging fruit.       Wearing a seat belt, having a safe car, and practicing good driving behaviors (like don’t text and drive) won’t guarantee you’ll never be in a car wreck – but if you do those things, the risk of getting into a crash go down dramatically AND your chances of coming out alive and unharmed will obviously increase.  Want a FREE, confidential assessment of your current cyber security status? Click here to schedule a quick 10-minute call to start a discussion and see if you could benefit from a more robust cybersecurity plan.

“If I’m Going To Get Hacked Anyway, Why Bother Spending Money On Cyber Security?” Read More »

3 Tech And Automation Strategies Businesses Must Have Now To Stay Competitive, Profitable And Thriving This Year

Covid changed everyone’s lives in dramatic ways on many levels – but small and big businesses alike were radically impacted, from events, restaurants, and retail being shut down to sending everyone home to work remotely.   It’s no surprise that the tech sector thrived during this time, from remote work solutions to online ordering, telemedicine, virtual events, and more. Good or bad, a LOT of these changes are here to stay.  Cyber security protection to avoid or at least mitigate losses. Warren Buffet is famous for his two rules of investing and making money: Rule #1: Don’t lose money. Rule #2: Never forget Rule #1.While nobody likes to spend money on cyber security, the simple fact of the matter is that if you don’t, or if you underinvest in adequate protections, you WILL lose money in your business, either from it being taken from your bank account or from the vast number of costs associated with a breach that most people grossly underestimate. Without a doubt, cybercriminals went gangbusters during the lockdowns when millions of people were forced to work remotely using unsecured home WiFi, laptops, and cell phones. The Trend Micro Annual Cybersecurity Report saw a whopping 16 million threats related to Covid-19 in 2020 alone. Business Wire recently reported that 81% of global organizations experienced an increase in cyberthreats and 79% experienced downtime due to a cyber security risk. These threats are continually getting more aggressive, frequent, and damaging, so you must have a plan in place to ensure you’re not robbed blind and taken out. Click here for a free cyber security risk assessment to see how vulnerable you are. Using tech to get more efficient with fewer employees. Since 2010, the US unemployment rate has been on a steady decline, from nearly 10% to under 3% right at the start of 2020. Covid shutdowns temporarily covered up this shortage with thousands being laid off, but now that life is back to “normal” (whatever this new normal is), the labor shortage has crippled many businesses that are now trying to reopen but can’t operate at full capacity, not only due to an inability to find and keep good people but also because of the cost of hiring with salary demands increasing.This is forcing many organizations to implement automated systems, as well as artificial intelligence to replace workers, like grocery store checkout lines being limited to only two or three open, driving customers to use self-checkout, or companies switching to AI-driven chatbots, text messages, and phone systems to handle the initial customer requests, lowering the need for paid employees. Another area many businesses are focusing on is getting more productivity from every employee using tech and automation. Many sales departments are using dialers, CRM, and marketing automation systems to get a single rep to be far more productive, generating more sales by removing or reducing manual labor tasks and “paperwork” that fills hours of any sales rep’s day. And finally, another growing area of focus is to ensure the productivity of employees. This has become a hot topic since the shutdowns sent so many people home to work, and many people now ONLY want remote work. The problem is, many employees lack the personal discipline and productive environment to work distraction-free, making them far less productive than if they came into an office. To combat this, some businesses are utilizing productivity-monitoring software like ActivTrak or Teramind to know just how much time employees are away from their computers or surfing social media and other non-work-related sites. Doing this allows the employer to know if any employee is truly “overworked” or barely putting in an eight-hour day. Click here to schedule a quick call to discuss this software for your business. Online ordering and fulfillment. At an event in our industry, Marcus Lemonis, the star of the hit TV show The Profit and CEO of the billion-dollar brands Camping World and Good Sam, shared how Camping World frantically transitioned his retail stores to online ordering, shipping, and drive-by pickup to enable his customers to keep buying when the stores were physically shut down. An investment that not only paid off in the short term but also expanded the company’s ability to generate sales and fuel customer spending and loyalty.Many restaurants started or enhanced online ordering during the lockdowns, some becoming pickup-only establishments with no indoor seating, decreasing the need for more employees while continuing to generate sales. They also started (and many have kept) ordering using a QR code, eliminating paper menus, and facilitating ordering and payment. Some have gotten into the business of preassembled cook-from-home boxes, like Middlebury Pizzeria, which sells mini pizza kits you make and bake at home, opening a new revenue stream they didn’t have pre-pandemic. A good question to ask is how can you add some type of digital or online ordering and fulfillment to your organization? Maybe it’s time to go paperless and collect all payments with credit cards or other digital payment systems, eliminating paper invoices and many of your collection problems once and for all. Many medical companies are now storing clients’ credit cards and bank information for this reason. Of course, this opens up another door for cyber security problems and compliance issues, but the payoff can be huge. As always, you can schedule a quick 10-minute call to discuss your ideas for going digital for payments and order fulfillment.

3 Tech And Automation Strategies Businesses Must Have Now To Stay Competitive, Profitable And Thriving This Year Read More »

How The New FTC Safeguards Rule Will Radically Change How Even Small Businesses Operate

A little over a year ago, the FTC made several amendments to the existing Safeguards Rule requiring even very small businesses to ensure the protection of client data. These changes, set to go into effect back in December of 2022, are now going to be enforced starting June 9, 2023 – and it’s very likely that your business, regardless of how small or how your tech is being handled, WILL be required to implement certain new security protocols. The Safeguards Rule was originally created for financial institutions. However, the new amendments broaden the definition of financial institutions to include real estate appraisers, car dealerships, and payday lenders. The FTC goes so far as to include any business that regularly wires money to and from consumers. These organizations are required to develop, implement and maintain a comprehensive security program to keep their customers’ information safe. Here are the provisions you must implement: Designate a qualified individual to oversee their information security program. That means someone at these companies needs to be trained in information security, receive continuing security education, and be in charge of ensuring the organization is correctly executing the written information security plan. If no one on your team meets this requirement, we can provide someone. Develop a written risk assessment. A risk assessment is done in two parts: one, a technical scan, and two, a questionnaire designed to reveal common security loopholes. This is typically outsourced to an IT firm like ours and needs to be reviewed annually (by law), but best practices should be quarterly if not monthly in situations where a business is handling a lot of sensitive information and the tolerance for risk by the owner is low. If you need this risk assessment, contact us. Limit and monitor who can access sensitive customer information. For example, don’t give your entire team access to your credit card processing system. Only allow one employee (the one who works in it day in and day out), as well as one backup person (possibly you, the owner), to be able to log in and access this information. Encrypt all sensitive information. Again, this is typically done by an outsourced IT company like ours, unless your company is large enough to have a robust cyber security team that can handle it. “Sensitive information” is not just medical records and credit cards, but clients’ e-mail addresses, phone numbers, Social Security information, driver’s license information, and birthdays. ALL of this can be used by hackers to exploit your customers using the data you host. Train security personnel. Employee awareness training is another key component to not only this law but also to get and keep insurance coverage on cyber liability, crime, and other insurance policies. Develop an incident response plan. Specifically, if (when?) you get compromised, you need to have a plan in place for how you will respond. This is also another service we offer to our clients but should be reviewed by your insurance agent, leadership team, board, and other key players in the organization. Periodically assess the security practices of service providers. This law also requires you to ensure any companies you are doing business with – specifically ones where sensitive information is shared – are secure and compliant. This may include requiring that vendors state in their contracts that they are adhering to the Safeguards Rule and to certain security frameworks, like CIS or NIST. Implement multifactor authentication or another method with equivalent protection for any individual accessing customer information. Also known as “2FA,” this process ensures anyone logging in to your accounts must authenticate that request via another device, such as a cell phone or e-mail.  If you want to discuss this new rule with us and how to get started with a Risk Assessment, click here https://calendar.app.google/jSA1tteBxFJKnJkX6 to schedule a phone consultation to discuss your concerns, questions, and specific situation. If you prefer, you can call us at 774-504-5558.

How The New FTC Safeguards Rule Will Radically Change How Even Small Businesses Operate Read More »

Winner Winner Chicken Dinner!

What do these three real e-mails have in common?  Kohl’s Winner – “Notifications – Re: 2nd attempt for Paul” WalmartStores – “Re: CONFIRMED: Paul you are selected” Lowe’s Winner – “Congratulations Paul! You Are The Lucky Online Winner Of A Brand-New Sweepstakes Dewalt Power Station Entry No, “Paul” isn’t the luckiest person in the world but, as you might have guessed, the target of cybercriminals.   All three of the above are examples of real recent e-mail scams* that were sent to hundreds of thousands of e-mail addresses with the goal of getting unsuspecting “winners” to provide personal information. This includes things like asking for a Social Security number to “verify” your identity before sending you the award you won. Or getting banking information so they can send you your monetary prize. Of course, they aren’t doing either of those things but rather using that information to steal from your accounts, steal your identity or simply sell the data on the dark web to others who will find ways to use that information. So, how does this affect your business? According to Symantec Security Center (https://www.broadcom.com/support/security-center), the average employee receives a scam e-mail about twice a week. That means companies with just 10 employees would be targeted up to 1,040 times a year!  While your employees may be too smart to actually provide their Social Security or bank account information, did you know that just clicking on a link in an e-mail can open up their computer (and every other computer and network it’s connected to) to a variety of risks? At best, it could just let the sender know the link was clicked and that it’s an active account, which will then often trigger more spam, and often make that account the target of more attacks.  At worst, simply clicking on a link could download a malicious file – like a virus, malware, or spyware – that then compromises the entire network and could record logins and passwords and access client databases and bank accounts.  Or it could lead to a scammy website (often made to look legitimate) where your employee could enter confidential information inadvertently. Obviously, none of these are good outcomes for your employee or your company. In 2020, attacks like this cost small businesses over $2.8 billion in damages, according to the US Small Business Administration, with costs of up to $653,587, according to Verizon. The good news is that there are easy and free ways to protect your employees and your business from these scams, like properly training employees about cyber threats, as well as inexpensive technical solutions like blocking known spam and prohibiting access to illegitimate websites. While these protections are low in cost, NOT having these training and protections in place could be disastrous for your company.  To eliminate worrying about the 1,040+ bad e-mails your employees get and hoping that none of them will EVER click on a bad link, go on the offensive and make sure they never even get these e-mails in the first place, and even if they do, the sites are blocked if they click! To see how to stop being a sitting duck and instead take control of your security, simply call us at 774-504-5558 or go to https://calendar.app.google/jSA1tteBxFJKnJkX6  to set up a quick call, and we’ll walk you through your options. *You can check the facts on these scams and get the details. For the one from “Kohl’s Winner,” go to https://www.youtube.com/watch?v=Hu-c_E8tkD0; from “WalmartStores, go to https://corporate.walmart.com/privacy-security/fraud-alerts/; from “Lowe’s Winner,” go to https://bestlifeonline.com/lowes-air-conditioning-message-scam-news/ Also, visit: https://www.sba.gov/blog/protect-your-small-business-cybersecurity-attacks https://www.verizon.com/business/resources/reports/dbir/2021/smb-data-breaches-deep-dive/

Winner Winner Chicken Dinner! Read More »

Are Your Smart Devices (Siri, Alexa, Google) Eavesdropping On You?

Have you ever had a conversation about a topic, and then later that day you start seeing news, ads, or updates about that subject, and said to yourself, “This can’t be a coincidence”? Well, you’re probably right.  According to Norton, who you may remember as an antivirus software company and who now also owns LifeLock, your smart devices ARE listening to you because that’s their job. However, you probably didn’t realize how much they are listening to you or what they do with the information they collect. In this blog, you’ll see that your devices are listening to you and using and distributing the information they get, and how to protect yourself while still using the features these smart devices offer. Chances are when you activated Siri, Alexa, or Google Assistant, it asked you to accept the terms and conditions, which you did, without reading or listening to them. A quick search of the terms for Siri (https://www.apple.com/legal/privacy/data/en/ask-siri-dictation) advises you that: When you use Siri and Dictation, your device will send other Siri Data, such as: Contact names, nicknames, and relationships (for example, “my dad”), if you set them up in your contacts Music and podcasts you enjoy Names of your devices and those of your Family Sharing members Names of accessories, homes, scenes, shared home members in the Home app, and Apple TV user profiles Labels for items, such as people’s names in Photos, Alarm names, and names on Reminders lists Names of apps installed on your device and shortcuts you added through Siri And Google states (https://policies.google.com/privacy): We will share personal information outside of Google if we have a good-faith belief that access, use, preservation, or disclosure of the information is reasonably necessary. We may share non-personally identifiable information publicly and with our partners – like publishers, advertisers, developers, or rights holders. For example, we share information publicly to show trends in the general use of our services. We also allow specific partners to collect information from your browser or device for advertising and measurement purposes, using their own cookies or similar technologies. These are just some of the highlights from their privacy policy, which is a lengthy 15 pages.  You’ve got to remember, the privacy policy isn’t there to protect you – it’s there to protect the companies that create them! So, what do you do? Do you stop using smart devices, get rid of your phone and build a house in the woods? That’s probably a little extreme for most, so here are two things that actually make sense. First, you can take some basic actions to disable a few of the “eavesdropping” features built into your smart devices. Norton (the antivirus people) has a three-step way to do that at: https://us.norton.com/blog/how-to/is-my-phone-listening-to-me Second, you need to know that if your data is going to be stolen, it’s probably NOT through Alexa, Siri, and Google.  Most data breaches come from malicious links in e-mails; old, unpatched security vulnerabilities in software; and unsuspecting employees taking actions they shouldn’t be taking. These risks can be mitigated and monitored, and existing vulnerabilities can often be eliminated, simply by having the right software updates installed.  While it’s a little weird that Apple may know that your favorite musician is actually Taylor Swift, it’s much worse if your business data gets stolen or locked down and you’re out of business until you pay ransom to hackers.  Click here to schedule a brief 10-minute call https://calendar.app.google/jSA1tteBxFJKnJkX6 discuss your situation, needs, and concerns. If appropriate, we can conduct a simple security assessment for free to know for sure if your network and data are safe.

Are Your Smart Devices (Siri, Alexa, Google) Eavesdropping On You? Read More »

Make Purchases Online? Here Are 4 Things You (And Your Employees) Need To Do To Keep From Becoming A Prime Target For Cybercriminals

ROI Revolution estimates that e-commerce sales will eclipse $236 billion this holiday season. While that’s the most popular time for consumers to purchase online, in 2021 over $2 billion a day was made in online purchases. Chances are you and your employees make purchases weekly personally and for your business. And…chances are that cybercriminals are doing their best to capitalize on this to steal credit card numbers, logins and passwords and even you and your customers’ banking information.  If they don’t follow these four practices to stay safer (notice I didn’t say safe) buying online, they could be exposing themselves and your business to identity theft, fraud, and more. Don’t reuse passwords from site to site. If you use the same password for multiple sites, when one company’s records get breached (which happens every day) a criminal now has access to multiple accounts. So make sure you use different passwords for different sites. This does make things slightly more complicated for you, but it also makes it infinitely harder for cybercriminals.  Check the URL in the address bar. One indication that a website is secure is that it either has a small lock symbol to the far left of the URL or “https” in the URL. If you see a lock that’s unlocked or just an “http,” the site is not secure – do NOT provide any credit card information or bank account details.  Don’t use a debit card to pay – only use a credit card. This way, if someone is able to access your account, you won’t lose what’s currently in your bank account. And most major credit cards have a $50 or less liability policy if unauthorized charges are made. So it’s important to watch those statements. If you do feel you’re the victim of fraud, make sure to contact your credit card company immediately. Be wary of any texts or e-mails about package deliveries. Even if you have something you’re tracking, go back to the site you originally purchased from to check notifications that way. Any links from an unknown sender could infect the device you’re on, which could expose you to viruses and malicious software.   While there are plenty of cybercriminals happy to scam consumers, who they really want to go after are businesses because they have much deeper pockets and there are multiple ways they can cause havoc.  Click here to schedule a brief 10-minute call https://calendar.app.google/jSA1tteBxFJKnJkX6 to discuss your situation, needs and concerns. If appropriate, we can conduct a simple security assessment for free to know for sure if your network and data is safe. To schedule a 10-minute call to make sure all hybrid employees have all the tools necessary to protect your company’s data, visit https://calendar.app.google/jSA1tteBxFJKnJkX6or call us 774-241-8600. 

Make Purchases Online? Here Are 4 Things You (And Your Employees) Need To Do To Keep From Becoming A Prime Target For Cybercriminals Read More »

If You Have Employees Working From Home, Here Are Three Things All Remote Employees Must Do Now To Prevent Your Company From Being Hacked

The last few years have seen countless companies going to a hybrid work model. According to a survey by Envoy over 77% of businesses have some full or part-time remote employees. While this change comes with many benefits, as a business owner, there are three big things you need to make sure your employees are doing to keep your company’s data secure, avoid online scams, and prevent being a victim of a cyber attack. Cybercriminals know that many of the security measures businesses have in place in their office instantly evaporate when employees work from home. Things like firewalls, secure Wi-Fi, and restricted physical access to a computer all disappear for remote workers.  According to the global security group the Institute for Security and Technology, businesses saw a 311% increase in Ransomware attacks in 2020 due to cyber criminals trying to exploit these trends. This has only increased as hybrid models have become more and more commonplace and look as though they are here to stay. But it doesn’t have to be all doom and gloom. Because these new models offer many benefits, it’s just important as a business owner to know what you need in place to keep from turning a positive into a giant catastrophe through no fault of your own. Here are three critical things you must do if you’re allowing employees to work remotely: Always On VPN for computers, tablets, and mobile devices to ensure that no matter what device employees use, or where they use it, you and your data are protected.  Use Multi-Factor Authentication (MFA). This is where you get a text, call or need to use an authentication app to log in to programs when your account is being used. Set your computer screen to lock automatically. This is a simple measure that automatically logs out and locks your computer so someone can’t just jump on and access your files and programs. Most small businesses aren’t doing these three basic things to keep your data and company from becoming a victim of cybercrime. They are easy to get in place and free or inexpensive. Want to know if your employees are putting your company at risk?  Click here to schedule a brief 10-minute call to discuss your situation, needs, and concerns. If appropriate, we can conduct a simple security assessment for free to know for sure if your network and data are safe. To schedule a 10-minute call to make sure all hybrid employees have all the tools necessary to protect your company’s data, visit https://calendar.app.google/jSA1tteBxFJKnJkX6 or call us at 774-241-8600. 

If You Have Employees Working From Home, Here Are Three Things All Remote Employees Must Do Now To Prevent Your Company From Being Hacked Read More »

Scroll to Top