Centrend

Author name: admin

How The New FTC Safeguards Rule Will Radically Change How Even Small Businesses Operate

A little over a year ago, the FTC made several amendments to the existing Safeguards Rule requiring even very small businesses to ensure the protection of client data. These changes, set to go into effect back in December of 2022, are now going to be enforced starting June 9, 2023 – and it’s very likely that your business, regardless of how small or how your tech is being handled, WILL be required to implement certain new security protocols. The Safeguards Rule was originally created for financial institutions. However, the new amendments broaden the definition of financial institutions to include real estate appraisers, car dealerships, and payday lenders. The FTC goes so far as to include any business that regularly wires money to and from consumers. These organizations are required to develop, implement and maintain a comprehensive security program to keep their customers’ information safe. Here are the provisions you must implement: Designate a qualified individual to oversee their information security program. That means someone at these companies needs to be trained in information security, receive continuing security education, and be in charge of ensuring the organization is correctly executing the written information security plan. If no one on your team meets this requirement, we can provide someone. Develop a written risk assessment. A risk assessment is done in two parts: one, a technical scan, and two, a questionnaire designed to reveal common security loopholes. This is typically outsourced to an IT firm like ours and needs to be reviewed annually (by law), but best practices should be quarterly if not monthly in situations where a business is handling a lot of sensitive information and the tolerance for risk by the owner is low. If you need this risk assessment, contact us. Limit and monitor who can access sensitive customer information. For example, don’t give your entire team access to your credit card processing system. Only allow one employee (the one who works in it day in and day out), as well as one backup person (possibly you, the owner), to be able to log in and access this information. Encrypt all sensitive information. Again, this is typically done by an outsourced IT company like ours, unless your company is large enough to have a robust cyber security team that can handle it. “Sensitive information” is not just medical records and credit cards, but clients’ e-mail addresses, phone numbers, Social Security information, driver’s license information, and birthdays. ALL of this can be used by hackers to exploit your customers using the data you host. Train security personnel. Employee awareness training is another key component to not only this law but also to get and keep insurance coverage on cyber liability, crime, and other insurance policies. Develop an incident response plan. Specifically, if (when?) you get compromised, you need to have a plan in place for how you will respond. This is also another service we offer to our clients but should be reviewed by your insurance agent, leadership team, board, and other key players in the organization. Periodically assess the security practices of service providers. This law also requires you to ensure any companies you are doing business with – specifically ones where sensitive information is shared – are secure and compliant. This may include requiring that vendors state in their contracts that they are adhering to the Safeguards Rule and to certain security frameworks, like CIS or NIST. Implement multifactor authentication or another method with equivalent protection for any individual accessing customer information. Also known as “2FA,” this process ensures anyone logging in to your accounts must authenticate that request via another device, such as a cell phone or e-mail.  If you want to discuss this new rule with us and how to get started with a Risk Assessment, click here https://calendar.app.google/jSA1tteBxFJKnJkX6 to schedule a phone consultation to discuss your concerns, questions, and specific situation. If you prefer, you can call us at 774-504-5558.

How The New FTC Safeguards Rule Will Radically Change How Even Small Businesses Operate Read More »

Winner Winner Chicken Dinner!

What do these three real e-mails have in common?  Kohl’s Winner – “Notifications – Re: 2nd attempt for Paul” WalmartStores – “Re: CONFIRMED: Paul you are selected” Lowe’s Winner – “Congratulations Paul! You Are The Lucky Online Winner Of A Brand-New Sweepstakes Dewalt Power Station Entry No, “Paul” isn’t the luckiest person in the world but, as you might have guessed, the target of cybercriminals.   All three of the above are examples of real recent e-mail scams* that were sent to hundreds of thousands of e-mail addresses with the goal of getting unsuspecting “winners” to provide personal information. This includes things like asking for a Social Security number to “verify” your identity before sending you the award you won. Or getting banking information so they can send you your monetary prize. Of course, they aren’t doing either of those things but rather using that information to steal from your accounts, steal your identity or simply sell the data on the dark web to others who will find ways to use that information. So, how does this affect your business? According to Symantec Security Center (https://www.broadcom.com/support/security-center), the average employee receives a scam e-mail about twice a week. That means companies with just 10 employees would be targeted up to 1,040 times a year!  While your employees may be too smart to actually provide their Social Security or bank account information, did you know that just clicking on a link in an e-mail can open up their computer (and every other computer and network it’s connected to) to a variety of risks? At best, it could just let the sender know the link was clicked and that it’s an active account, which will then often trigger more spam, and often make that account the target of more attacks.  At worst, simply clicking on a link could download a malicious file – like a virus, malware, or spyware – that then compromises the entire network and could record logins and passwords and access client databases and bank accounts.  Or it could lead to a scammy website (often made to look legitimate) where your employee could enter confidential information inadvertently. Obviously, none of these are good outcomes for your employee or your company. In 2020, attacks like this cost small businesses over $2.8 billion in damages, according to the US Small Business Administration, with costs of up to $653,587, according to Verizon. The good news is that there are easy and free ways to protect your employees and your business from these scams, like properly training employees about cyber threats, as well as inexpensive technical solutions like blocking known spam and prohibiting access to illegitimate websites. While these protections are low in cost, NOT having these training and protections in place could be disastrous for your company.  To eliminate worrying about the 1,040+ bad e-mails your employees get and hoping that none of them will EVER click on a bad link, go on the offensive and make sure they never even get these e-mails in the first place, and even if they do, the sites are blocked if they click! To see how to stop being a sitting duck and instead take control of your security, simply call us at 774-504-5558 or go to https://calendar.app.google/jSA1tteBxFJKnJkX6  to set up a quick call, and we’ll walk you through your options. *You can check the facts on these scams and get the details. For the one from “Kohl’s Winner,” go to https://www.youtube.com/watch?v=Hu-c_E8tkD0; from “WalmartStores, go to https://corporate.walmart.com/privacy-security/fraud-alerts/; from “Lowe’s Winner,” go to https://bestlifeonline.com/lowes-air-conditioning-message-scam-news/ Also, visit: https://www.sba.gov/blog/protect-your-small-business-cybersecurity-attacks https://www.verizon.com/business/resources/reports/dbir/2021/smb-data-breaches-deep-dive/

Winner Winner Chicken Dinner! Read More »

Are Your Smart Devices (Siri, Alexa, Google) Eavesdropping On You?

Have you ever had a conversation about a topic, and then later that day you start seeing news, ads, or updates about that subject, and said to yourself, “This can’t be a coincidence”? Well, you’re probably right.  According to Norton, who you may remember as an antivirus software company and who now also owns LifeLock, your smart devices ARE listening to you because that’s their job. However, you probably didn’t realize how much they are listening to you or what they do with the information they collect. In this blog, you’ll see that your devices are listening to you and using and distributing the information they get, and how to protect yourself while still using the features these smart devices offer. Chances are when you activated Siri, Alexa, or Google Assistant, it asked you to accept the terms and conditions, which you did, without reading or listening to them. A quick search of the terms for Siri (https://www.apple.com/legal/privacy/data/en/ask-siri-dictation) advises you that: When you use Siri and Dictation, your device will send other Siri Data, such as: Contact names, nicknames, and relationships (for example, “my dad”), if you set them up in your contacts Music and podcasts you enjoy Names of your devices and those of your Family Sharing members Names of accessories, homes, scenes, shared home members in the Home app, and Apple TV user profiles Labels for items, such as people’s names in Photos, Alarm names, and names on Reminders lists Names of apps installed on your device and shortcuts you added through Siri And Google states (https://policies.google.com/privacy): We will share personal information outside of Google if we have a good-faith belief that access, use, preservation, or disclosure of the information is reasonably necessary. We may share non-personally identifiable information publicly and with our partners – like publishers, advertisers, developers, or rights holders. For example, we share information publicly to show trends in the general use of our services. We also allow specific partners to collect information from your browser or device for advertising and measurement purposes, using their own cookies or similar technologies. These are just some of the highlights from their privacy policy, which is a lengthy 15 pages.  You’ve got to remember, the privacy policy isn’t there to protect you – it’s there to protect the companies that create them! So, what do you do? Do you stop using smart devices, get rid of your phone and build a house in the woods? That’s probably a little extreme for most, so here are two things that actually make sense. First, you can take some basic actions to disable a few of the “eavesdropping” features built into your smart devices. Norton (the antivirus people) has a three-step way to do that at: https://us.norton.com/blog/how-to/is-my-phone-listening-to-me Second, you need to know that if your data is going to be stolen, it’s probably NOT through Alexa, Siri, and Google.  Most data breaches come from malicious links in e-mails; old, unpatched security vulnerabilities in software; and unsuspecting employees taking actions they shouldn’t be taking. These risks can be mitigated and monitored, and existing vulnerabilities can often be eliminated, simply by having the right software updates installed.  While it’s a little weird that Apple may know that your favorite musician is actually Taylor Swift, it’s much worse if your business data gets stolen or locked down and you’re out of business until you pay ransom to hackers.  Click here to schedule a brief 10-minute call https://calendar.app.google/jSA1tteBxFJKnJkX6 discuss your situation, needs, and concerns. If appropriate, we can conduct a simple security assessment for free to know for sure if your network and data are safe.

Are Your Smart Devices (Siri, Alexa, Google) Eavesdropping On You? Read More »

Make Purchases Online? Here Are 4 Things You (And Your Employees) Need To Do To Keep From Becoming A Prime Target For Cybercriminals

ROI Revolution estimates that e-commerce sales will eclipse $236 billion this holiday season. While that’s the most popular time for consumers to purchase online, in 2021 over $2 billion a day was made in online purchases. Chances are you and your employees make purchases weekly personally and for your business. And…chances are that cybercriminals are doing their best to capitalize on this to steal credit card numbers, logins and passwords and even you and your customers’ banking information.  If they don’t follow these four practices to stay safer (notice I didn’t say safe) buying online, they could be exposing themselves and your business to identity theft, fraud, and more. Don’t reuse passwords from site to site. If you use the same password for multiple sites, when one company’s records get breached (which happens every day) a criminal now has access to multiple accounts. So make sure you use different passwords for different sites. This does make things slightly more complicated for you, but it also makes it infinitely harder for cybercriminals.  Check the URL in the address bar. One indication that a website is secure is that it either has a small lock symbol to the far left of the URL or “https” in the URL. If you see a lock that’s unlocked or just an “http,” the site is not secure – do NOT provide any credit card information or bank account details.  Don’t use a debit card to pay – only use a credit card. This way, if someone is able to access your account, you won’t lose what’s currently in your bank account. And most major credit cards have a $50 or less liability policy if unauthorized charges are made. So it’s important to watch those statements. If you do feel you’re the victim of fraud, make sure to contact your credit card company immediately. Be wary of any texts or e-mails about package deliveries. Even if you have something you’re tracking, go back to the site you originally purchased from to check notifications that way. Any links from an unknown sender could infect the device you’re on, which could expose you to viruses and malicious software.   While there are plenty of cybercriminals happy to scam consumers, who they really want to go after are businesses because they have much deeper pockets and there are multiple ways they can cause havoc.  Click here to schedule a brief 10-minute call https://calendar.app.google/jSA1tteBxFJKnJkX6 to discuss your situation, needs and concerns. If appropriate, we can conduct a simple security assessment for free to know for sure if your network and data is safe. To schedule a 10-minute call to make sure all hybrid employees have all the tools necessary to protect your company’s data, visit https://calendar.app.google/jSA1tteBxFJKnJkX6or call us 774-241-8600. 

Make Purchases Online? Here Are 4 Things You (And Your Employees) Need To Do To Keep From Becoming A Prime Target For Cybercriminals Read More »

If You Have Employees Working From Home, Here Are Three Things All Remote Employees Must Do Now To Prevent Your Company From Being Hacked

The last few years have seen countless companies going to a hybrid work model. According to a survey by Envoy over 77% of businesses have some full or part-time remote employees. While this change comes with many benefits, as a business owner, there are three big things you need to make sure your employees are doing to keep your company’s data secure, avoid online scams, and prevent being a victim of a cyber attack. Cybercriminals know that many of the security measures businesses have in place in their office instantly evaporate when employees work from home. Things like firewalls, secure Wi-Fi, and restricted physical access to a computer all disappear for remote workers.  According to the global security group the Institute for Security and Technology, businesses saw a 311% increase in Ransomware attacks in 2020 due to cyber criminals trying to exploit these trends. This has only increased as hybrid models have become more and more commonplace and look as though they are here to stay. But it doesn’t have to be all doom and gloom. Because these new models offer many benefits, it’s just important as a business owner to know what you need in place to keep from turning a positive into a giant catastrophe through no fault of your own. Here are three critical things you must do if you’re allowing employees to work remotely: Always On VPN for computers, tablets, and mobile devices to ensure that no matter what device employees use, or where they use it, you and your data are protected.  Use Multi-Factor Authentication (MFA). This is where you get a text, call or need to use an authentication app to log in to programs when your account is being used. Set your computer screen to lock automatically. This is a simple measure that automatically logs out and locks your computer so someone can’t just jump on and access your files and programs. Most small businesses aren’t doing these three basic things to keep your data and company from becoming a victim of cybercrime. They are easy to get in place and free or inexpensive. Want to know if your employees are putting your company at risk?  Click here to schedule a brief 10-minute call to discuss your situation, needs, and concerns. If appropriate, we can conduct a simple security assessment for free to know for sure if your network and data are safe. To schedule a 10-minute call to make sure all hybrid employees have all the tools necessary to protect your company’s data, visit https://calendar.app.google/jSA1tteBxFJKnJkX6 or call us at 774-241-8600. 

If You Have Employees Working From Home, Here Are Three Things All Remote Employees Must Do Now To Prevent Your Company From Being Hacked Read More »

This ONE Person Can Sink Your Company

It’s not just cybercriminals who hack into networks and steal data. Most business owners erroneously think cybercrime is limited to hackers based in China or Russia, but the evidence is overwhelming that disgruntled employees, both of your company and your vendors, can cause significant losses due to their knowledge of your organization and access to your data and systems. What damage can they do?  They leave with YOUR company’s files, client data, and confidential information stored on personal devices, as well as retaining access to cloud applications, such as social media sites and file-sharing sites (Dropbox or OneDrive, for example), that your IT department doesn’t know about or forgets to change the password to. In fact, according to an in-depth study conducted by Osterman Research, 69% of businesses experience data loss due to employee turnover, and 87% of employees who leave take data with them. What do they do with that information? Sell it to competitors, BECOME a competitor, or retain it to use at their next job. Funds, inventory, trade secrets, client lists, and HOURS stolen. There are dozens of sneaky ways employees steal, and it’s happening a LOT more than businesses care to admit. According to the website StatisticBrain, 75% of all employees have stolen from their employers at some point. From stealing inventory to check and credit card fraud, your hard-earned money can easily be stolen over time in small amounts that you never catch.Here’s the most COMMON way they steal: They waste HOURS of time on your dime to do personal errands, shop, play games, check social media feeds, gamble, read the news and a LONG list of non-work-related activities. Of course, YOU are paying them for a 40-hour week, but you might only be getting half of that. Then they complain about being “overwhelmed” and “overworked.” They tell you, “You need to hire more people!” so you do. All of this is a giant suck on profits if you allow it. Further, if your IT company is not monitoring what employees do and limiting what sites they can visit, they could do things that put you in legal jeopardy, like downloading illegal music and video files, visiting adult content websites, gaming, and gambling – all of these sites fall under HIGH RISK for viruses and phishing scams. They DELETE everything. A common scenario: An employee is fired or quits because they are unhappy with how they are being treated – but before they leave, they permanently delete ALL of their e-mails and any critical files they can get their hands on. If you don’t have that data backed up, you lose it ALL. Even if you sue them and win, the legal costs, time wasted on the lawsuit and on recovering the data, not to mention the aggravation and distraction of dealing with it all, are all greater costs than what you might get awarded if you win the lawsuit, might collect in damages. Do you really think this can’t happen to you? Think again.  You have to be proactive in protecting your organization. To find out if your IT company is doing everything in its power to protect you book a 10-minute discovery call using this link https://calendar.app.google/jSA1tteBxFJKnJkX6 and you’ll also get access to a FREE and confidential cybersecurity risk assessment.

This ONE Person Can Sink Your Company Read More »

Technology Problems Shouldn’t Be Scary

If you depend on your computer network to run your business (and who doesn’t?), you’ll want someone treating your data as securely as they would their own.    Not knowing what’s going on behind the scenes should scare the crap out of you. It is NOT unreasonable that your IT company is monitoring your network 24/7/365. Stop paying for substandard support. It’s important for you to interview your current company to ensure they are up to your standards. This will help you determine if it’s time for a change (so you can sleep at night). The top 3 questions to ask include: “Do you provide detailed invoices clearly outlining what we are paying for?”       If your auto draft is just sending a traditional monthly payment without explanation, something isn’t right. Each invoice needs to show what services each dollar covers, just to ensure you aren’t being nickel-and-dimed outside of what’s covered in your contract. “Do you provide status reports on new projects?”       Or if they’re working on an in-process project? It’s on them to provide updates and give you ETAs on when work will be completed.   “Do you offer guarantees on services?”       Any IT company should back its services 100%. Any updates, additions, subtractions, etc., should not be an additional charge and should be guaranteed to work the first time, without having to submit an additional ticket.  We are offering a free report with 13 additional questions to ask any IT company to make sure you have hired the best choice for services. It also includes cost-saving strategies. To know more about it, you may call us at 774-504-5558 or book a 10-minute discovery call using this link https://calendar.app.google/jSA1tteBxFJKnJkX6

Technology Problems Shouldn’t Be Scary Read More »

What is your stripper name?

Anyone active on social media has seen those seemingly harmless quizzes that someone in your newsfeed takes and then shares…the ones that ask you to enter your first name, your middle name, and the street you grew up on to create your “new name.” Joe + Schmo + Blow Avenue = your stripper name. Turns out they aren’t so harmless. A hacker could use any of this info to get past firewalls into your accounts (financial or otherwise) by filling in answers to gain passwords. They can also use this information to hack into your profile. Then, by controlling your account, they are able to reach out to friends and colleagues, sending messages to you, which can quickly damage your reputation. According to the FTC, customers in 2021 reported losing about $770 million to fraud that started on social media. That’s an 18-fold increase since 2017 and affected more than twice the 2020 number of customers. In 2021, it affected more than 95,000 people. Socialcatfish.com ranked Facebook as the most popular platform for online scams. Other common social media scams include: Giveaways, where you’re told you have won but you need to submit payment info to receive your prize Profile hacking, where someone poses as an online “friend” and asks for money to get out of a bad situation Job offers, where what you think is a legitimate work-from-home opportunity might require you to pay a fee to “start” or guarantee a high paycheck for a menial task The best way to avoid these scams is to just be wary. Be careful of oversharing online. Does something seem too good to be true? Is your “friend” speaking in an unusual way? Reach out offline. Know that only scammers ask for money via a wire transfer or gift card. And if you really can’t resist a fun online quiz (because everyone else is taking it), just make up the answers.   If you do notice a scam, you can report it to the BBB Spam Tracker and ReportFraud.ftc.gov to help others. To check if your private data has been exposed to any hackers online, schedule a 10-minute discovery call with our team now. Call us at 774-504-5558 or book a time here: https://calendar.app.google/jSA1tteBxFJKnJkX6

What is your stripper name? Read More »

Are You On A Bad Date And Don’t Even Know It?

They don’t call you back, they don’t text back, and when you get time with them, they are disheveled, rude, and uninterested, doing barely enough to keep things going. This sounds like a bad date…and it’s one that many businesses are on with their current IT guy. You have a problem, need a password, the Internet is down, you have site problems, need a new computer [insert any part here] and you “submit a ticket” only to wait hours, days, or even weeks to hear back, much less get the problem resolved. The #1 complaint businesses have that causes them to “break up” with their current IT guy is that he simply wasn’t responsive. Just like you wouldn’t stand for this in your personal life, you shouldn’t stand for it in your professional life…especially when you’re paying them!!! If your current company doesn’t have a response-time guarantee, you’re probably on a bad date. Most IT firms offer a 60-minute or 30-minute response time to your call during normal business hours. Be very wary of someone who doesn’t have a guaranteed response time IN WRITING – that’s a sign they are too disorganized, understaffed, or overwhelmed to handle your request.  A good IT firm should be able to show you statistics from their PSA (professional services automation) software, where all client problems (tickets) get responded to and tracked. Ask to see a report on average ticket response and resolution times. Also, any good IT company will answer their phones LIVE (not voice mail or phone trees) and respond from 8:00 a.m. to 5:00 p.m. every weekday. But many CEOs and executives work outside normal “9 to 5” hours and need IT support both nights and weekends, so ask about their guarantees for after-hours issues as well.

Are You On A Bad Date And Don’t Even Know It? Read More »

How To Find Your Passwords (And Never Need To Reset Them Again)

There are two types of people…which one are you? The frustrated, constant updater: You find yourself having to constantly click on “Forgot My Password” and verify your account, check your texts, scan a finger (give a pint of blood…maybe not that one) so you can reset your password. And it’s probably a brand-new one because you can’t use one you’ve used before, so this situation will happen again and again and again. The weary optimist: You use the same password for every site, even though you know you shouldn’t because you’re tired of dealing with the above situation. This makes it SUPER-easy for hackers because chances are your password is available for sale on the dark web right now. But…you HOPE this doesn’t happen to you or you think you’re too small to worry about this because they only care about the “big fish.” If you’re Person Type 1, it’s annoying, time-consuming, and frustrating. If you’re Person Type 2, it’s only a matter of time before you’re hacked, and it doesn’t end with you but can affect any business computers you use that lead to access of client, customer, or patient records, and the results can be a total disaster. But there’s a simple solution. A password manager. A password manager is like a digital vault. Your passwords, addresses, payment info, and logins are encrypted in the software. You will have one master password you use to “unlock the vault.” If the password manager gets breached, your data is not at stake because your master password is either stored on a server and encrypted or it’s stored locally on your computer. What’s the difference between using a password manager and one that’s included on your web browser, such as storing that information in Chrome or Safari? The biggest difference is that browser storage cannot be shared with others. For those who work in an office and need to collaborate with teammates, most password managers let you encrypt the data to pass along if someone else needs to access a site. If you have data stored on your browser and then, for instance, decide to make a purchase through the Instagram app, that credit card data will not pass through since it’s outside the browser. There are free and paid versions, and they each have some pros and cons. Here’s a quick breakdown of the four we get asked about most. Bitwarden – Free forever. That free version contains unlimited passwords on unlimited devices, with the ability to share with one other user. For $10/year, you can add two-factor authentication and security reports. And if you’re looking to join a team, you can do so for as little as $3/month per user. If you’re moving from a different password manager, you can import logins without having to copy and paste each individually. LastPass – LastPass does not store your master password on their servers. The free version only includes one device, and for $3/month for premium, you also get 1 GB of storage to back up sensitive documents such as passports, home and car titles, wills, etc. Their team version is $4/month per user. 1Password – Just like LastPass, this software offers a free Chrome extension so it can autofill on sites without you having to do anything. It works on Edge and Brave as well. While there is no free version, for $2.99/month you can try free first for 14 days. One neat feature is to go into travel mode, so you can pull sensitive data from your device before you travel and then restore it once you’re back home, with just one click. Keeper – Winner of PC Mag’s Best Of The Year for 2021. For $2.92/month, you get unlimited password storage on unlimited devices, with sync features. This software also allows for fingerprint and face ID logins, so there is one fewer password to remember. Families can use it for $6.25/month and share streaming and WiFi passwords too. If you would like to set up a password manager for your business, schedule a call with our team by calling 774-241-8600.

How To Find Your Passwords (And Never Need To Reset Them Again) Read More »

Scroll to Top