Malware, Ransomware, and the Next Big Threat

September 21, 2017
Imagine the lost revenue for a major retailer if they needed to shut down all of their stores for a few days, or even a few hours, especially over the busy holiday season. The impact would be devastating.

Protect Your Back-to-School Sales From POS Ransomware

August 08, 2017
Security experts believe that cybercriminals will be shifting tactics due to declining revenues from stolen credit card sales. We discuss rationale for the rise of ransomware – and what you need to do to get ready for a potential and ongoing surge of attacks. We believe there’s not a minute to lose with back-to-school season underway, so let’s get started.

Protecting Against Ransomware Attacks: What Every Business Needs to Know

July 11, 2017
Ransomware attack frequency is at its height as there have been more than 4,000 ransomware attacks happening each day for over a year now. Follow these tips to help avoid a ransomware breach at your business.

The Top Five Cyber Threats Hotel Brands and Franchisees Need to Know About

June 19, 2017
While automation facilitates hotel operations and often makes a better stay for guests, it also opens hotels to digital threats perpetrated by malicious actors. Consequently, hotel operators should be aware of the types of cyber attacks, which can significantly hurt their brand reputation and bottom line, not to mention the safety and welfare of employees and guests.

Tips for Protecting Information While on the Go: What Summer Travelers Need to Know About Security

May 16, 2017
As the summer travel season quickly approaches, most people envision exchanging work clothes and school books for shorts, flip flops, and beach umbrellas as they look forward to that well-deserved vacation. Unfortunately, hackers have their own plans this summer...

The Top Five Threats That Restaurant Franchisees Need to Know About

March 29, 2017
Restaurants with multiple locations are taxed with increased pressure to succeed in different geographic locations, with potentially different demographics. This means implementing popular technology to serve that area—sometimes quickly—to keep the business afloat. The faster their success, customer enjoyment, and diner loyalty accelerate the more likely these locations are to become and remain go-to dining spots. However, in the rapid shuffle of getting these technologies set up, security is often forgotten.

Foster a Healthy Security Posture

February 27, 2017
Securing medical records is a complex undertaking. Healthcare organizations need an array of security technologies that can be used to prevent malicious attacks and keep personal healthcare information safe, while retaining the day-to-day ease-of-use.

Serving up Security: What Restaurants Need to Know about Breach Risks and Prevention

December 14, 2016
Sure, the headlines have been wrought with healthcare ransomware stories, election-centric email breaches, and massive retail hacks—but restaurants are becoming more vulnerable to data breaches as well and cannot remain complacent.

Key takeaways from the presidential debate on cybersecurity.

September 28, 2016
​The presidential debate, as entertaining as it was for many, was a great place to hear about the focus needed on cybersecurity issues in this country. Both candidates were asked the following question on the topic of cybersecurity in the U.S...

Are there any weaknesses in your Point-of-Sale System?

September 06, 2016
News about a company being breached seems to be a regular occurrence nowadays. And it’s no wonder, with hackers getting more sophisticated and hungry for more.

Is your brand truly secured?

July 18, 2016
So you have a big brand name that millions of consumers trust. You have hundreds to thousands of locations across the U.S…. and perhaps even globally. A big name means big money, so that huge chunk of change dedicated to security is definitely paying off in spades, right? All too often, the answer is a resounding “WRONG.”

7 ways you can prevent credit card fraud when shopping!

July 11, 2016
We know how tempting those summer sales are! But are you being careful on where you are swiping your card?

Are you guilty of any of these PCI myths?

June 27, 2016
We have gathered what have been common comments that we hear from business owners. And today, we would like to bust these myths!

What you should know about programs, ports and services

June 17, 2016
In this fourth article in the series, we continue to explore some of the basic ways that business of all sizes can keep their computer systems safer. We will discuss the topic of programs, ports and services.

7 things you need to know about Anti-Virus protection.

June 09, 2016
In this entry we discuss the topic of anti-virus protection. There are many questions that come up when we talk about this topic. So here are a few answers to your questions.

The Perils of Using Remote Access Software

June 02, 2016
While software that can be installed on your PC and used to remotely connect when you are away from your home office can be very handy, it also comes with risks that may not be apparent at first.

Why is patching important to the security of your business?

May 31, 2016
If you are not keeping up with regular patching of your computer and the programs that run on it – then you are simply asking for trouble. Many of the breaches that make the news are caused by holes in software for which a patch existed by the vendor.

Protecting your business from hacker’s attacks.

May 20, 2016
2016 Verizon Breach Investigations Report (Part 3 of 3)
We've covered the 4 patterns of attack used by hackers, expanded on how dangerous these attacks are and how hackers are hurting your business. But did you know, many of these attacks can be prevented with a little help and knowledge? 

What tools are hackers using to access businesses’ networks?

May 13, 2016
2016 Verizon Breach Investigations Report (Part 2 of 3)
In our previous post we showed you that regardless of the business’ size, location or industry, many are targets to hackers. So how are hackers getting into these businesses’ networks and stealing data?

Is your business at risk of a data breach?

May 06, 2016
2016 Verizon Breach Investigations Report (Part 1 of 3)
The 80 page report is packed with valuable data breach insights. We know time is valuable so we decided to save you some by sharing the 3 main topics you should understand from this report.

No Business is Too Small for Hackers!

May 02, 2016
It's National Small Business Week! Let's celebrate the hard work you do and make sure your business continues to grow. Have you ever thought about what would happen if your business is affected by a data breach? 

Your Best Defense Against Ransomware Might Be Your Employees

April 20, 2016
While your business’ data security program should consist of many components, perhaps the most effective defense to ransomware is building a culture of data security amongst your employees.

Just how dangerous is ransomware?

April 06, 2016
Ransomware is a business’ worst nightmare. This malware infects computers and restricts the users from accessing any of their data until paying the ransom. What would you do to get that data back?

Hungry…Hungry…HIPAA

February 26, 2016
I have fond memories of playing a board game called Hungry Hungry Hippos in my younger days. Today’s medical practices mirror the chaos of the game. Each day seems more hectic than the previous...

Pain-Free Data Security for Medical Offices

January 26, 2016
It’s understandable that the primary goal of any healthcare practice is to keep their patients healthy and safe. But what about keeping their patients’ data safe too?

2015: “The Year of the Healthcare Hack"

January 14, 2016

2015 was a tough year for the healthcare industry. Some are even calling 2015 “the year of the healthcare hack”. Last year, over 65% of the data breaches occurred in the healthcare industry...

Why Do Hackers Want Your Medical Records

November 16, 2015
2015 has been a year of healthcare data breaches. But why are hackers going after healthcare records now?

How Strong Are Your Passwords? Tips To Keep You Protected

September 21, 2015
Passwords keep your accounts and network safe but may also be a gateway for hackers. Here are some quick tips we recommend when creating your passwords.

Find Out Who Is Affected By A Data Breach?

September 14, 2015
The number of data breaches continues to increase. Cybercrime affects your brand, your customers and your employees in ways that are unrecoverable at times. Don't let your business be affected next.

Healthcare Practices are at Particularly High Risk of Data Breach

September 10, 2015
The CDC estimates that close to 80% of office-based physicians use some form of electronic medical records. This increase, coupled with recent breaches of patients’ PHI and PII, has highlighted the need for security of medical office networks.

The Impact Of A Data Breach

August 31, 2015
What is the true cost of a data breach? A data breach affects your business, brand, and reputation. But it can be prevented.

4 Common Data Threats Every Business Needs to Be Aware Of

August 24, 2015
Four Common Data Threats

Netsurion Defense Against Backoff

July 14, 2015
In the wake of BackOff, and numerous other data breaches, consumers are demanding answers into the how and why surrounding companies who have inadvertently allowed data to be compromised given security measures accessible today.

State Sponsored Hacking – More Than an Issue for Sony

January 14, 2015
We live in a brave new world where the spies of yesteryear, like James Bond and Jason Bourne, are truly falling away into the realm of fantasy, replaced instead with hackers, doing battle on the digital front.

IT Community Shaken By Shellshock Vulnerabilities

October 29, 2014
In the wake of Heartbleed, comes a new form of exposure that could potentially do much more damage than any other vulnerability of its kind. It is known as Shellshock. Shellshock affects Linux and UNIX implementations that use the BASHcommand interpreter.

Christmas-Kids and Hackers Love This Time of Year

December 06, 2013
When people think of Christmas, most of them imagine family gatherings and good times. We often forget that from the end of Thanksgiving to the beginning of the year, the U.S. spends billions of additional dollars on merchandise that otherwise would have stayed on the shelves. We sometimes forget that hackers love this season as well.

Does Your Call for Help Bring Hackers to Your Door?

July 19, 2013
There is a new trend facing people who rely on help desks. Hackers are targeting help desks because they know that the people who provide you support have the access into your systems that they want to exploit.

Balancing Privacy and Security

May 31, 2013
In the wake of the most recent terrorist bombing in Boston, it is easy to understand why some people would be willing to sacrifice a few liberties to the government in favor of more security. A common train of thought is that an honest person does not have anything to hide, so the intrusion into our private lives is really a minor thing. In a Utopian society, I would tend to agree with that sentiment, but we live somewhere else.

Square Cash - A Money Transfer Game Changer?

May 24, 2013
Square strives to make financial transactions simple enough so that the average person on the street can participate. Before Square, a regular person without a bank supplied merchant account could not take credit cards. Today, Square allows everyone with a smart phone to accept credit cards, and now the company is focusing on another market – person to person cash payments.

Hackers May Just Look to Embarrass You

March 29, 2013
When you think about electronic security, what comes to mind? Do you consider how vulnerable your customer credit cards are, or how easily someone can break into your on-line bank account? These are the most profitable avenues of attack that thieves usually focus on, but occasionally, cybercriminals are motivated by something besides greed.

Universal Plug and Play - New Report on an Old Problem

February 22, 2013
In the dark ages of personal computers (1980′s and 90′s), you either needed to be a computer geek or have access to one if you wanted any device to work with your computer. You had to go through a complicated driver installation process, and possibly replace system files. My how the world has changed.

Do Hackers Fear U.S. Jails?

January 18, 2013
In what should only be considered a victory for the U.S. DOJ, 2 of the 4 alleged Subway hackers responsible for potentially $10 Million dollars in computer fraud have been sentenced, and 1 of the remaining criminal’s trial is set to begin shortly.