Now that you have read The Ping: What is Compliance?, you are probably especially aware that your company might need to become compliant in one or more areas. Whether that be PCI, CJIS or something else, you might need to meet minimum regulations to keep your company safe.
As the year draws to a close, we want to remind you of how important it is to stay diligent with your cybersecurity awareness training and security updates. This year, like years past, cybersecurity breaches have topped headline news and may have affected you personally. Let’s review some of the larger breaches and malware risks this year. These are security breaches that allowed someone or some group to access personal information, and they could even access some examples of how that information was used.
For each area of concern with sensitive data, there are published guidelines to follow in order to achieve compliance. Reading and digesting the guidelines in whole can be a difficult task. There are decision making tools, technical requirement write-ups, security policies, and security procedures to pour through. So, without getting into the nitty gritty, we want to answer some of the frequently asked questions that come our way.
What is compliance? Some of you might be acutely aware of this term, and others might have little to no idea. In broad terms, business compliance means following the rules required to secure your business and the people that interact with it. More specifically, compliance is aimed at information security. Business Compliance means you are complying with requirements by a credible organization or government department that promotes the security and protection of sensitive information.
*Special Alert* – Extortion Email Scam
A worrying new type of phishing email is going around using stolen data from high-profile websites. These emails include a password that has been used with the user’s email address in the past in an attempt to scare that person into sending the scammer money (typically Bitcoin). Since the emails include personalized information, they appear credible in ways typical phishing emails do not. Typically, the scammer is claiming that they have recorded “compromising activity” and blackmailing the user for their silence.
Within the last year, Facebook, MyHeritage, Ticketfly, Under Armour, and several other high-profile services have been compromised.
Ah Budgeting… The least favorite thing we can do in both our personal and business lives. Although it isn’t fun, it tends to make our lives much easier in the long run. Let’s break down the basics to getting you and your organization onto a budget plan that will work for your business goals.
Once you’ve decided to work remotely, you may find it difficult to stay in sync with the rest of your team back in the office. Digital workforce infrastructure has been engineered for decades to provide a stable foundation for your office, but now that you’re outside of your firewall you may find yourself as frustrated as a hacker would be when trying to access your company’s documents. While you may still be able to email back and forth with your coworkers, you can’t easily update your shared files, see who’s available to receive an incoming call, or update a customer’s order status.
Working remotely may seem rather quick and easy. You head on over to your local coffee shop, order your triple-shot, half-caff, no foam, extra hot latte and sit at your favorite table in the corner. You double check to make sure no one is looking over your shoulder, pop open your laptop and get to work. Right? Well, it’s actually a little more complicated than that. Staying secure in a non-secure work place comes with some much needed extra steps to keep your company data away from prying eyes.
So, now that you’ve made the decision to switch to VoIP, you’ll need to compare the details of your current phone configuration with the new phone configuration. Here are a few of the key issues to address with your vendor:
Connection TypeWhile a coax connection has always been the less expensive route, fiber has come a long way in lowering its costs. If you’re in the Central Texas area, coax connections have become saturated. The more Austin grows, the more businesses are adding Internet. That amount continues to be shared across the city, but with more and more users. Since this is NOT a dedicated (to you) connection, this can cause Internet traffic to slow and potentially make your VoIP connection less clear. With hosted VoIP, you will want your connection to your host smooth and fast. Remember, hosted providers can boast about their connection and multisite locations as a sellingpoint, but it is only as fast and as efficient as the connection YOU are using to get there!
In our last post we talked about the Pros and Cons of moving your systems to the cloud vs. keeping them in your office.
As you can see, it can really be a toss-up. Some systems are better kept at your office and some should be moved to the cloud. It really depends on your business’s current and future needs.