Last week we addressed the importance of implementing a Disaster Recovery plan under your own Business Continuity program. And as we mentioned previously, this is a necessity under most, if not all, compliance requirements. The next question is, do you know what it means to maintain compliance?
Last week, we were speaking of cloud services and how to choose the correct one for your organization. Ensuring you choose a company that covers all your compliance and disaster recovery needs is an important part of the process. Replacing hardware and software on a regular basis is equally important. Having up to date hardware and software can help keep you safe and keep your employees happy. The easiest way to ensure that your hardware stays current is to create a replacement cycle.
What is unique about a city or local governmental organization? Services must be tailored to a local government’s unique needs. Governments are subject to a strict budgeting process that generally can’t be altered throughout the fiscal year. Any additional items not on these budgets, in which costs exceed a specific price point, are subject to a bidding process; sometimes this can take place even before being finalized in the budget. Furthermore, all items are subject to an open records request. We realize that this month we’re talking about a very specific set of customers. That does not mean non-city customers should set your alarm for August 1st and tune out for July. We consistently write our articles so that they contain helpful information that anyone can utilize in order to help make your organization a better and more efficient workplace.
By now you should have trained your employees on what an attack might look like. Now what? Training an employee is half the battle. Not only do they need to know what NOT to do, they need to know what TO DO when a challenge presents itself. Next, employees need to be aware of internal changes that could directly impact them or their environment, and what to do in case your company does fall victim to an attack. One might call this a Security Plan…
Last week in The Ping: State of Cybersecurity, we spoke about the rise of cybercrime. Cyber criminals are continuing to find ways to access both personal and organizational networks. The good news is that there are a few things you can do to help prevent this from happening to you and your company.
With every Microsoft product you purchase there is a known EOL, or End of Life. Simply put, it’s an expiration date for your software or licensing. The most common reason is due to advancements and/or changes in technology that lead to your current purchases becoming obsolete. That is not to say that the software or devices that you recently purchased aren’t advanced for their current life cycle, but at one time we also believed that Windows 95 was so advanced we couldn’t imagine we would ever need a new operating system again. Fast forward to 2019 and we are 8 OS versions past Windows 95 with Windows 10.
So you might have heard the buzzwords “2FA” or “Multi-factor Authentication” thrown around a lot lately. The use of 2FA has become increasingly popular over the last few years. Apple has started prompting their users to activate this more advanced form of security. Your child’s Xbox Live account is now also prompting them to activate and use 2FA. Software you use at work, particularly credit card processing software, may also require card access or a 6 digit code. So that begs the question: what is multi-factor authentication?
Although Microsoft Office 365 has plenty of helpful features, sometimes you come across a need for which some 3rd party provides a plugin. Seeing that not all add-ons developers are created equally, we’ve tested and compared some to help you make an informed decision. Whether you need email backups, archival or encryption we’ve got you covered! All of the add-ons we review below have proven to be reliable, easy to use and capable to provide some level of security compliance feature as required by HIPAA, PCI, SOX and/or CJIS.
As the year draws to a close, we want to remind you of how important it is to stay diligent with your cybersecurity awareness training and security updates. This year, like years past, cybersecurity breaches have topped headline news and may have affected you personally. Let’s review some of the larger breaches and malware risks this year. These are security breaches that allowed someone or some group to access personal information, and they could even access some examples of how that information was used.