Centrend

Author name: Mary Ann Velasco

How To Beat The Hackers This Year

It’s game time – and while the biggest teams are gearing up for football’s biggest day, cybercriminals are busy preparing their playbook for 2025. Just like a championship game, the battle against hackers requires strategy, teamwork and preparation. Are you ready to tackle this year’s biggest cybersecurity threats? Here’s what the experts predict for 2025 and how your business can come out on top. This Year’s Cybersecurity MVPs (Most Vicious Perpetrators) 1. AI-Powered Phishing Plays Cybercriminals are using artificial intelligence to craft highly personalized and convincing phishing e-mails that can trick even the most cautious employees. These messages look authentic, often mimicking trusted brands or colleagues. Your Defense: 2. Ransomware Blitz Ransomware continues to dominate as one of the biggest threats to businesses of all sizes. Hackers are not only encrypting files but also threatening to leak sensitive data if ransoms aren’t paid. Your Defense: 3. Supply Chain Sneak Attacks Hackers are targeting small and midsize businesses to infiltrate larger supply chains. By breaching your network, they can gain access to partners and vendors, spreading their reach. Your Defense: 4. Deepfake Decoys Deepfake technology is being weaponized to impersonate executives or colleagues, convincing employees to transfer funds or share sensitive information. Your Defense: 5. Internet Of Things (IoT) Fumbles Smart devices like printers, cameras and even thermostats are often overlooked when it comes to cybersecurity. Hackers exploit these weak points to gain access to your network. Your Defense: Your Game Plan In 2025 Winning against hackers this year requires more than just strong plays – it takes a solid game plan. Here’s how to stay ahead: Get Your Free Cybersecurity Game Plan Ready to take your cybersecurity strategy to the next level? Schedule a FREE Network Assessment today. We’ll identify vulnerabilities, provide actionable solutions and ensure your business is prepared to beat the hackers this year. Don’t let cybercriminals win the championship. With the right team and strategy, you can protect your business and stay ahead of the game. Click here to book your FREE Network Assessment now!

How To Beat The Hackers This Year Read More »

Inside Look: How Hackers Use AI To Attack Your Business

f you think hackers are only targeting Fortune 500 companies, think again. Thanks to artificial intelligence, cybercriminals now have the power to scale their attacks like never before – and small business owners are at the top of their hit list. Why? Because cybercriminals know you don’t have the resources of a big corporation but still have valuable data they can exploit. Hackers are no longer just sending poorly written e-mails or guessing passwords with slow, simplistic software. AI gives them smarter, faster tools to outthink and outmaneuver businesses that aren’t prepared. And if you don’t have a rock-solid defense, they will find a way in. Here’s how hackers are weaponizing AI and, more importantly, how you can protect yourself from becoming their next victim. AI-Powered Phishing Scams Traditional phishing attacks relied on generic, poorly written e-mails. You’ve likely read a few with spelling errors or grammatical issues. AI has upped the ante with highly personalized, convincing messages tailored to individual targets. Hackers use AI to: Example: Imagine receiving an e-mail that looks like it’s from your bank. It’s addressed to you personally, mentions your company name and references a recent “transaction attempt” that was declined. It asks you to “click here to confirm your information” or “update your credit card details to avoid account suspension.” Here’s where the attack happens: The result? Hackers have what they need to empty your account, steal sensitive business data or launch further attacks on your company. Automated Vulnerability Scanning Hackers now deploy AI to automate the process of scanning small businesses for vulnerabilities. Tools powered by AI can: Impact: Small businesses with limited IT resources often become easy prey for these automated attacks. Hackers can identify and exploit a weakness within minutes, giving them access to your systems before you even realize there’s an issue. The result? Costly downtime, data theft or even complete loss of access to your network. AI-Driven Malware AI enables hackers to create malware that evolves quickly. These malicious programs: Real Threat: AI-powered ransomware can now lock down systems faster and demand ransoms more effectively, putting small businesses at greater risk. Deepfake Technology For Social Engineering AI-generated deepfake videos and audio are no longer just tools for Hollywood. Hackers use this tech to impersonate executives or trusted contacts, convincing employees to: Example: Imagine your CFO receives a call that sounds exactly like your CEO, complete with their tone, phrasing and even their sense of urgency. The “CEO” instructs the CFO to urgently wire funds to a vendor to close a big deal. The voice is so convincing that the CFO complies without a second thought – only to discover later that the funds were sent to a fraudulent account. Deepfakes make these scams shockingly believable, leaving even the most cautious employees vulnerable to manipulation. Advanced Password Cracking AI-powered algorithms can guess passwords at lightning speed. Using techniques like pattern recognition, hackers can crack even moderately strong passwords. Tip: Multifactor authentication is no longer optional – it’s essential to combat this growing threat. How To Protect Your Business From AI-Powered Cyberthreats AI is transforming cybersecurity – for both attackers and defenders. While hackers are using AI to target vulnerabilities, businesses can also use it to bolster their defenses. Staying informed and proactive is key to keeping your business safe in this ever-evolving digital battlefield. Ready to fortify your business? Click here or call our office at 774-241-8600 to schedule a FREE Cybersecurity Assessment today to ensure your defenses are AI-proof.

Inside Look: How Hackers Use AI To Attack Your Business Read More »

Data Privacy Day: How To Protect Your Business From Costly Data Breaches

January 28 is Data Privacy Day, a global reminder of just how vital it is to keep sensitive information secure. For business owners, “data privacy” is more than just a buzzword; it’s a critical part of protecting your bottom line. Data breaches cost businesses an average of $4.35 million in 2023, according to IBM’s Cost Of A Data Breach report, and that number is only going up. The good news? With the right precautions, you can minimize your risk and avoid becoming a headline. Why Data Privacy Matters For SMBs Many small and midsized businesses assume they’re too small to be targeted by cybercriminals. Unfortunately, that’s a myth. Nearly 43% of cyber-attacks target small businesses, and most of these businesses lack the resources to recover from a significant breach. The consequences of a data breach can be devastating: What Types Of Data Do Cybercriminals Target? Hackers are primarily after: But they will exploit any data they can get their hands on! How Does Data Get Stolen? Cybercriminals are constantly innovating ways to steal data, and some of the most common methods include: It’s important to take every precaution possible to prevent your data from being compromised! Here’s how to strengthen your data privacy!  Know Your Data The first step in protecting your data is understanding what you have and where it’s stored. Conduct a data inventory to identify: Quick Tip: Only collect and store what you truly need – less data means less risk. Encrypt Everything Encryption turns sensitive data into unreadable code, making it useless to hackers without the decryption key. From e-mails to databases, encryption should be a standard practice. Pro Tip: Ensure encryption is applied both in transit and at rest for maximum security. Implement A Strong Access Control Policy Not every employee needs access to all your data. Adopt a principle of least privilege (PoLP), ensuring team members only access what’s necessary for their role. Example: Your marketing team doesn’t need to see payroll data Train Your Team Human error is a leading cause of data breaches. Regularly train employees on data privacy best practices, including: Statistic: 88% of data breaches are caused by employee mistakes, according to Stanford University research. Partner With A Trusted IT Provider Managing data privacy is complex, and SMBs often lack the resources to do it alone. A managed IT provider can help: Don’t Leave Data Privacy To Chance Data breaches don’t just cost money – they can cost your reputation or even your business. This Data Privacy Day, take the opportunity to evaluate your security practices and make necessary improvements. Start with a FREE Network Assessment to uncover your vulnerabilities and ensure your business is protected against costly breaches. Click here to schedule your FREE assessment and take control of your data privacy today! Let’s make 2025 the year your business stays one step ahead of the threats.

Data Privacy Day: How To Protect Your Business From Costly Data Breaches Read More »

New Year, New Tech: Top IT Upgrades To Supercharge Your Business In 2025

January isn’t just for fresh starts and ambitious resolutions – it’s the perfect time to evaluate your business’s technology needs. As we step into 2025, staying competitive means leveraging IT solutions that boost efficiency, improve security and prepare you for the demands of a rapidly changing, AI-focused digital world. The cost of outdated or inefficient IT systems is steep: According to a report by ITIC, the average cost of IT downtime for an SMB is $1,670 per minute per server! There are also other costs that we can’t measure in direct dollars, but the loss is still felt. This are the cost of constant disruptions to business through dropped calls, lagging Internet, improperly organized cloud systems, etc. With that in mind, here are the top IT upgrades that can set your business up for success this year. 1. Move To The Cloud – Enhance Flexibility And Reduce Costs Cloud solutions are no longer just about file storage; they’re the backbone of modern business operations. If you don’t use them, you are not only behind but working inefficiently. From improving collaboration for remote teams to ensuring business continuity in the event of an outage, moving to the cloud offers: Businesses using cloud technologies report a 20% average reduction in IT spending, according to Flexera. 2. Strengthen Your Cybersecurity Strategy With cyberthreats evolving daily, it’s critical to stay one step ahead. Cybercrime is expected to cost businesses $10.5 trillion annually by 2025, according to Cybersecurity Ventures. Protect your business with: Prioritizing cybersecurity is not just about protection – it’s about maintaining trust and avoiding costly downtime or reputational damage. 3. Upgrade Your Hardware Outdated devices can bottleneck productivity and expose your network to vulnerabilities. If your computers, servers or networking equipment are several years old, consider replacing them with more efficient and secure alternatives. What To Look For: 4. Leverage AI-Powered Tools For Operational Efficiency Artificial intelligence is no longer a luxury – it’s a necessity for businesses looking to streamline operations. AI tools can: And so much more! For example, AI-driven tools can help your IT team identify and resolve issues before they impact your business and even handle customer service questions or complaints. 5. Adopt Unified Communications Unified Communications as a Service (UCaaS) brings your e-mail phone, video conferencing and chat tools into one integrated platform. The result? Better collaboration, reduced miscommunication and significant time savings. Pro Tip: Look for UCaaS solutions with built-in security and integration capabilities to ensure seamless adoption across your team. Every business has unique needs, and IT upgrades are not a one-size-fits-all solution. While these suggestions provide a starting point, the best results come from building an optimized system tailored to your specific goals and challenges. That’s where a FREE Network Assessment can make all the difference. By evaluating your current infrastructure, identifying inefficiencies and prioritizing your investments, you can make informed decisions that maximize your IT budget and create a system designed for efficiency and growth. Ready to future-proof your business to scale up in 2025? Call us at 774-241-8600 or click here to schedule your FREE Network Assessment today and take the first step toward a smarter, more secure IT environment.

New Year, New Tech: Top IT Upgrades To Supercharge Your Business In 2025 Read More »

Cyber Insurance For Small Business: Why You Need It And How to Get Covered In 2025

In 2024, cyberthreats are no longer just a big-business problem. In fact, large corporations with deep pockets are not the primary target for most cybercriminals. Less well-defended small and medium-sized businesses are increasingly at risk, with the average cost of a data breach now totaling over $4 million (IBM). For many smaller businesses, an incident like this could be devastating. This is where cyber insurance comes in. Not only does it help cover the financial fallout of a cyber-attack, but it’s also a safeguard to help your business recover quickly and keep moving forward in the event of an attack. Let’s break down what cyber insurance is, whether you need it and what requirements you’ll need to meet to get a policy. What Is Cyber Insurance? Cyber insurance is a policy that helps cover the costs related to a cyber incident, such as a data breach or ransomware attack. For small businesses, this can be an essential safety net. If a breach happens, cyber insurance can help cover: These policies are typically divided into first-party and third-party coverage. Think of cyber insurance as your backup plan for when cyber risks turn into real-world problems. Do You Really Need Cyber Insurance? Is cyber insurance legally required? No. But, given the rising costs of cyber incidents, it’s becoming an essential safeguard for businesses of all sizes. Let’s look at a couple of specific risks small businesses face: While having strong cybersecurity practices is critical, cyber insurance acts as a financial safety net if those measures fall short. The Requirements For Cyber Insurance Now that you know why cyber insurance is a smart move, let’s talk about what’s required to qualify. Insurers want to make sure you’re taking cybersecurity seriously before they issue a policy, so they’ll likely ask about these key areas: This is only the tip of the iceberg. They’ll also consider if you have data backups, enforce data classification and more.  Conclusion: Protect Your Business With Confidence As a responsible business owner, the question to ask yourself isn’t if your business will face cyberthreats – it’s when. Cyber insurance is a critical tool that can help you protect your business financially when those threats become real. Whether you’re renewing an existing policy or applying for the first time, meeting these requirements will help you qualify for the right coverage. If you have questions or want to make sure you’re fully prepared for cyber insurance, reach out to our team for a FREE Security Risk Assessment. We’ll evaluate your current cybersecurity setup, identify any gaps and help you get everything in place to protect your business. Click here or call our office at 774-241-8600 to book now.

Cyber Insurance For Small Business: Why You Need It And How to Get Covered In 2025 Read More »

6 Ways Your Phone Is Tracking You

Have you ever casually talked about a product or service while your phone was nearby and then suddenly started seeing ads for it on your social media feed? Your phone is listening. If that concerns you, this should really worry you: your devices are tracking you too! From the phone itself to the apps you download and access, there are multiple ways that your device can ping your location. Luckily, there are ways around allowing your phone to spy on you. In today’s article we’ll share why it’s so dangerous, the top six ways your phone is tracking you and how you can shut it down.  Why Is It Dangerous?  This data is a hot commodity for Internet marketers. The collected data is used to target you with the local and interest-based ads you’re most likely to be interested in. This digital “stalking” is legal as long as they give you the option to opt in or out. However, marketing execs aren’t the only ones interested in your data. Cybercriminals are too. Here are the reasons allowing your phone to track you is a no-go: 1. Privacy Invasion: Phone tracking allows apps, websites and third parties to collect extensive information about your location, habits and behaviors without your full knowledge. This constant surveillance can lead to a significant invasion of privacy, making users vulnerable to targeted advertising, data harvesting or even malicious tracking for more harmful purposes. 2. Identity Theft And Fraud: If your phone’s tracking data falls into the wrong hands – such as hackers or cybercriminals – it can be used to gather personal details and patterns. This data can enable identity theft, financial fraud or unauthorized access to sensitive accounts, causing financial and emotional harm. 3. Physical Security Risks: By sharing your real-time location data, phone tracking can expose you to physical security threats. For example, stalkers or criminals can exploit this information to track your whereabouts, compromising your safety. Publicizing your movements can also make it easier for bad actors to predict your routines or target you when you’re most vulnerable. How Your Phone Is Tracking You  1. Location Services: Your phone’s GPS and location services track your whereabouts in real time, recording where you are and how long you stay there. Using “Frequent Locations,” your phone makes assumptions about where you work and live based on when you visit and how long you stay. While this is helpful for finding directions or nearby restaurants, constant tracking can also reveal your movement patterns, leaving you vulnerable to privacy invasion. Both Apple and Android give you the option to turn this feature off. Exact instructions will vary by specific model and operating system; however, here are basic instructions: How to turn it off: 2. App Permissions: Many apps request access to your contacts, photos, microphone and camera, allowing them to track your activity, even when you’re not actively using the app, and collect more information than necessary. You can adjust this and should review it regularly to make sure you aren’t compromising your privacy. How to turn it off: 3. Wi-Fi And Bluetooth Connections: Your phone constantly scans for Wi-Fi and Bluetooth connections, allowing third parties to track your location based on the networks and devices you’ve interacted with. How to turn it off: 4. Browsing Activity: Web browsers and apps monitor your search history and the websites you visit. This data is used to build profiles about your preferences, feeding you targeted ads and potentially selling your behavior patterns to third parties. How to turn it off: 5. Ad Tracking: Your phone assigns you a unique advertising ID that companies use to track your behavior across apps and websites. This ID follows your activity, providing advertisers with insight into your interests to serve personalized ads. How to turn it off: 6. Social Media And Search Engines: Platforms like Facebook, Instagram and Google track your online interactions, searches and location to create detailed profiles of your habits and interests. They use this data for advertising and content recommendations, which can feel invasive. How to turn it off: By adjusting these settings, you can significantly reduce the amount of personal information your phone tracks, giving you more control over your privacy. Why This Matters For Business Owners:  For a business owner, protecting your personal privacy is just as crucial as securing your company’s sensitive information. The same tracking methods that follow your every move can also expose your business to risks. Hackers, cybercriminals and even competitors can exploit these vulnerabilities to gather valuable data about your business activities, customer interactions and confidential communications. By taking steps to limit how your phone tracks you and adjusting your privacy settings, you’re not just protecting yourself – you’re also safeguarding your business from potential data breaches, identity theft and targeted cyber-attacks. In today’s world, cybersecurity isn’t just a technical issue, it’s a strategic one, and staying ahead of threats starts with being informed and proactive. If you’re concerned about your business’s overall security, don’t wait for a problem to occur. Schedule a FREE Security Risk Assessment with our team today, and let’s ensure your entire network is protected from top to bottom. Our experts will identify vulnerabilities and recommend tailored solutions to keep your business safe. Click here or call us at 774-241-8600 to get started.

6 Ways Your Phone Is Tracking You Read More »

5 Options If Your Windows 10 PC FAILS The Windows 11 Compatibility Test

As you likely heard, Windows 10 will reach its end of life on October 14, 2025. This means Microsoft will no longer offer free security updates, non-security updates and technical support on this version. That does not mean the PCs will no longer work; it simply means you are on your own to keep your device secure and functioning efficiently. If you’ve already attempted to upgrade to Windows 10 but your PC failed the pesky compatibility checker and received an error message, don’t worry – you still have options. Here are the 5 options available to you: Moving everything over to a new operating system will bring its own set of headaches, so make sure you only take this option if you’re willing to deal with any issues that arise. ZDNET walks you through the process, but, in a nutshell, you can upgrade your PC that was initially designed for Windows 10 by making a minor registry edit and then making sure your PC is configured to use Secure Boot with the Trusted Platform Module (TPM). They go on to suggest that you shouldn’t worry if you receive a message saying, “If you proceed with installing Windows 11, your PC will no longer be supported and won’t be entitled to receive updates. Damages to your PC due to lack of compatibility aren’t covered under the manufacturer warranty.” This doesn’t mean your information will be deleted on the spot; it simply prevents the company from being legally responsible if something happens because the device is no longer supported. If you choose this option, know that it’s not inexpensive. For business owners, the subscription cost for the first year is $61. The price doubles in year two, costing $122, and again in year three, costing $244. This comes out to an outstanding $427, nearly 50% higher than when they offered this solution for Windows 7 in 2020. Educators, fortunately, get a price break. The pricing structure is the same, but the cost for the first year is only $1. It doubles to $2 in the second year and doubles again to $4 in the third year. It’s important to note that these updates are cumulative and do not include technical support. This means you can only get a year-two subscription IF you already purchased year one, and you’re on your own for the technical assistance you need. It is clear the ESUs are not meant to be a long-term solution and are priced to encourage users to upgrade to Windows 11.  Before making a decision, make sure you back up your data thoroughly and regularly. Losing all your information is not a problem you want to take on. Do not wait until the last minute to start thinking about your options. Time will pass quickly, and you want to have this handled before October 2025. If choosing what to do feels daunting, our team of experts can help. We can guide you in making the best decision for your unique situation. If you choose to upgrade, our team will work to create a seamless transition that avoids unnecessary costs or downtime. To get started, give us a call at 774-241-8600 or click here to book now.

5 Options If Your Windows 10 PC FAILS The Windows 11 Compatibility Test Read More »

Avoid A Holiday Tech Meltdown With Better IT

Ah, the holiday season – when everything gets festive, sales go up and your to-do list grows longer than your wish list. For businesses, this time of year can be make-or-break, but while you’re decking the halls, your IT infrastructure might be decking you with unwanted downtime and cyberthreats. The last thing you need during the holiday rush is a tech meltdown. So, how can you make sure your business technology keeps up with the festive pace? Proactive IT support is the answer. Why The Holiday Season Puts Your IT Systems To The Test During the holidays, your business faces unique pressures that can turn minor IT problems into major crises. Here are some common issues you might encounter: The Case For Proactive IT Support Rather than playing catch-up when things go wrong, reliable and proactive IT support helps you avoid these problems before they happen. Here’s how it works: The Financial Upside Of Proactive IT The benefits IT services provide are ones that pay for themselves in the long run. Here’s why: Are You Ready For A Tech Refresh? So, how do you get started with better, more reliable IT support? It’s time to partner with a trusted IT team. We’ll audit your IT infrastructure to determine what is outdated or slowing you down and where you’re at risk. Once we complete the audit, we’ll help you optimize your systems and keep things running smoothly all year long. And the best part? You don’t have to do this alone. We’re offering a FREE Network Assessment to help you identify vulnerabilities in your current setup. Our experts will evaluate your entire network and recommend solutions that will keep your business humming through the holidays and beyond. Get Your FREE Network Assessment Today! Don’t wait until a tech meltdown ruins your holiday season. Get proactive with your IT support now! Click here to schedule your FREE Network Assessment today, and let’s ensure your business stays on top of its game when it matters most.

Avoid A Holiday Tech Meltdown With Better IT Read More »

The Top 5 Data Breaches Of 2024 And What You Need To Know About Them

This year has been a busy one for cybercriminals, with some massive data breaches making headlines and costing companies millions. From health care giants to project management platforms, no industry is immune to the risks. But what do these breaches mean for small to midsize businesses? The same vulnerabilities exist for you, and the consequences of not addressing them can be catastrophic.  Let’s recap five of the most significant breaches of 2024 so far and discuss how your business can stay protected. 1. National Public Data A couple of months ago, a hacking group claimed to have stolen 2.7 billion personal records from a background checking and public data-brokering site. The data includes sensitive information like Social Security numbers, addresses and more. Portions of the data have been released on the dark web, though experts are still evaluating its accuracy, as the combined populations of the countries listed amount to only about half a billion. However, it’s likely that many Social Security numbers have been compromised. Since this breach affects so many people, everyone now has an incentive to monitor their financial and online identities closely, and it’s imperative that they do so immediately. A practical step is freezing your credit to protect against identity theft and unfreezing it when needed for activities like applying for loans or credit cards. Find out if you were exposed here!  2. Ticketmaster  A significant data breach at Ticketmaster exposed the personal and financial information of over 560 million customers. Hackers accessed the company’s database during April and May, stealing sensitive details such as names, e-mails, phone numbers and payment information. This breach exposed serious flaws in Ticketmaster’s security, raising concerns among consumers. Many victims reported unauthorized transactions and identity theft following the incident. Additionally, this breach added to the legal troubles of Ticketmaster’s parent company, Live Nation, which was already facing a lawsuit from the US Department of Justice for anticompetitive practices. 3. Change Healthcare In February 2024, Change Healthcare was hit by a massive ransomware attack that exposed the personal information of over 145 million people. This breach, one of the largest in health care history, compromised sensitive data, including names, addresses, Social Security numbers and medical records. The incident had far-reaching effects on patients, health care providers and insurance companies, prompting many in the health care industry to reconsider their cybersecurity strategies to prevent similar attacks in the future. 4. AT&T In March, AT&T was the victim of a data breach that compromised the personal information of approximately 73 million current and former customers. This giant breach included sensitive data such as Social Security numbers, account details and passcodes. The breach was linked to data from as far back as 2019, which surfaced on the dark web in March 2024. This incident is part of a series of attacks on AT&T, following a 2023 breach that impacted 9 million users. In response, AT&T launched an investigation to contain the malware while maintaining services for current customers. The breach has also opened the company up to the possibility of multiple class action lawsuits. While you may not manage millions of customers like AT&T, your business can still fall victim to cyber-attacks. It’s crucial to protect your network by implementing robust security measures, training employees on password and phishing prevention, and maintaining an active cybersecurity strategy. 5. Dell In May, Dell experienced a security breach when a hacker known as Menelik used a brute-force attack to infiltrate one of their resellers’ client portals. This breach exposed 49 million records containing sensitive data, including customer names, e-mail addresses, payment information and account details. The incident sparked significant concerns about Dell’s cybersecurity practices, leading the company to issue a public apology and pledge to enhance its security protocols. In response to the breach, Dell has faced increased regulatory scrutiny and may encounter legal challenges as more details about the impact emerge. What Does This Mean For You Personally? We have several blogs on what to do if you’re affected by a data breach, but the most important action is to freeze your credit and check your bank account. Websites like www.haveIbeenpwnd.com can tell you if your e-mail has been exposed in a breach.  What Does This Mean For Your Business? While these breaches happened to major players, small to midsize businesses are far from off the radar. In fact, SMBs are increasingly targeted because they often lack the robust security measures that larger companies have. Cybercriminals know this, and the stakes couldn’t be higher: a single breach could cost your business thousands in downtime, lost data and damaged reputation. Protect Your Business With A FREE Security Risk Assessment If these stories have you thinking about your own vulnerabilities, that’s a good thing. The best defense is a proactive one. We’re offering a FREE Security Risk Assessment to evaluate your network for potential risks. Our experts will assess your system’s vulnerabilities, help you patch the holes and ensure your business is fortified against attacks. Don’t wait until you’re the next headline – get your FREE Security Risk Assessment today! Click here to schedule or call our office at 774-241-8600.

The Top 5 Data Breaches Of 2024 And What You Need To Know About Them Read More »

Was Your Information Compromised From The National Public Data Breach?

National Public Data confirmed in September 2024 that a hacker has compromised the personal records of millions of individuals. The information exposed includes the names, e-mail addresses, mailing addresses, phone numbers and even Social Security numbers of up to 2.9 billion people. Here’s what you need to know. What happened? National Public Data, a consumer data broker that specializes in providing criminal records, background checks and other forms of data to private investigators, consumer public record sites, human resources, staffing agencies, the government and more, was hacked. The incident is believed to have started in December 2023 when a third-party bad actor attempted to gain access. In April, a cybercriminal named “USDoD” posted the stolen data online in a popular criminal community. On August 6, the stolen dataset resurfaced, this time posted for free to several breach forums for anyone to access and download. The sensitive, personally identifiable information released included names, addresses, phone numbers, e-mail addresses and Social Security numbers for millions of people, some of whom are deceased. The data also contained previous addresses and, in some instances, alternate names. The official data breach notice that was filed in Maine indicated that 1.3 million records may have been breached; however, some lawsuits are suggesting as many as 2.9 billion records have been exposed. As the investigation continues, many cyber experts are finding that some of the data released was inaccurate, and aside from the Social Security numbers, most of it is already public and easy to find online. So why is this breach dangerous if the information can be found with a quick Google search? There are several reasons to be concerned. Having all this critical information in one place makes it easy for criminals to use the information needed to apply for credit cards and loans or open new bank accounts. The information included, such as childhood street names or the last four digits of your Social Security number, are often answers to security questions and can help hackers bypass authentication and access your private accounts. Some cyber experts are suggesting watching for a surge in phishing and smishing (phishing over SMS) attacks as well. Can you be affected even if you’ve never heard of National Public Data or purchased data from them? Yes! Just because you haven’t interacted with them doesn’t mean other organizations, businesses, landlords, etc., haven’t leveraged their resources to dig up information on you. What should you do to protect yourself? Step 1: Check to see if your data has been exposed. You can use tools like https://npd.pentester.com/ to find out if your information has been compromised. If so, it’s important to take immediate action. Step 2: Request a copy of your credit report and then freeze your credit. One of the best ways to protect your identity is to freeze your credit and set up alerts. This prevents criminals from opening up new lines of credit in your name. To do this, contact all three major credit bureaus – Equifax, TransUnion and Experian – and request a freeze. The process is free and should take you less than 10 minutes per site to complete. If there are others in your house over the age of 18, it’s a good idea to freeze their credit too. Anyone with a Social Security number is vulnerable following a breach of this size. Once you have a copy of your free credit report, review it for anything that you didn’t authorize. Don’t forget to set up alerts and review your credit regularly. Step 3: Watch out for phishing scams. As mentioned, many cybercriminals will try to leverage this information to scam you through phone calls, text messages, e-mails and even social media sites. Be cautious! A data breach is devastating for everyone involved – the business hacked and the customers or employees whose data is leaked. As a business owner, it is your responsibility to make sure you are taking the highest precautions to protect your business and its data. If you want to do a full assessment and find out if any of your information has been leaked or if your network is vulnerable to a breach, we’ll do a FREE Security Risk Assessment. This deep dive into your network will provide you with a blueprint for security steps to take. To book yours, call our office at 774-241-8600 or click here.

Was Your Information Compromised From The National Public Data Breach? Read More »

Scroll to Top