IT The Way It's Supposed To Be!

818-501-3390

The IT Blog for LA Businesses - Valuable Technology Insights

My Network's Secure, Right?

Posted by Craig Pollack on Jun 14, 2017 8:31:00 AM

This is the question I've been hearing all too often these days: "We have a firewall, so my network's secure. Right?" or "You guys are monitoring my network, so it's secure. Right?"

Now, I won't get into too much detail here but let me just say there's a HUGE difference between managing a network vs. securing a network (ie: monitoring and maintaining a network for performance, stability, and up time vs. monitoring and securing it from the perspective of potential intrusion activity), two completely different purposes and, therefore, two completely different requirements, toolkits, and services delivered.

That said, I'd rather focus on the initial, essential question of "Is my network secure?"

Read More

Topics: General Business Owner Articles, Cyber Security

What is Cyber Liability Insurance and Why You Need It!

Posted by Craig Pollack on May 31, 2017 8:31:00 AM

It's pretty safe to say, every business has a computer these days. In fact, it's almost safe to say every employee at every company has a computer. Computer networks are part and parcel of running a business.  And these days they're more sophisticated than ever - with hybrid on-premise and cloud applications, remote access, mobile devices, always-on connectivity - the security failure points are almost infinite.  This is the landscape we work in when we're managing and securing our clients' networks.  So, how does Cyber Liability Insurance fit into this discussion?

Read More

Topics: General Business Owner Articles, Cyber Security

Hands Down The Best Cyber Security Investment

Posted by Craig Pollack on May 24, 2017 8:31:00 AM

With everything happening on the cyber security front these days, what is a business to do? There's ransomware (which may or may not be considered a security "breach"), malware, hacks, and threats all over the place. At the same time, there are so many ways you can strengthen the cyber security posture of your business! But, where do you start?  Easily, hands down, one of the best (and most cost effective) ways to make a dent in improving the security of your network is actually not to. Let me explain myself...

Read More

Topics: General Business Owner Articles, Cyber Security

SEC Alerts Advisers on WannaCry Ransomware Cyberattacks

Posted by Craig Pollack on May 17, 2017 8:31:00 AM

In the wake of the pervasive "WannaCry" ransomware cyberattack over the past few days, the Securities and Exchange Commission issued a cybersecurity alert on Wednesday to broker-dealers, advisers and investment funds with a number of recommendations.

Read More

Topics: General Business Owner Articles, Cyber Security

Ransomware is Really This Easy!

Posted by Craig Pollack on May 10, 2017 8:05:00 AM

Ever wonder why we're beating the drum so loudly about doing all you can to protect yourself from ransomware these days? Let's skip over how incredibly damaging getting hit can be. Let's forget about the Russian hacking of emails. Forget about some black hat hacker in some foreign land (who seems so far away that you think he's unlikely to care about your company's network). How about we consider the boy next door?

Read More

Topics: General Business Owner Articles, Cyber Security

Massive Phishing Attack Targets Millions of Gmail Users

Posted by Craig Pollack on May 3, 2017 5:00:00 PM

Google confirmed the validity of the latest phishing attack which targets Gmail users. This attack seeks to gain control of users' email histories and then spread itself to all of their contacts. The worm arrives in users' inboxes posing as an email from a trusted contact and then asks users to check out an attached "Google Docs," or GDocs, file. Clicking on the link takes you to a real Google security page, where you are asked to give permission for the fake app, posing as GDocs, to manage users' email account.

Read More

Topics: General Business Owner Articles, Cyber Security

The Cliff Notes of Verizon's 2017 Data Breach Report

Posted by Craig Pollack on Apr 26, 2017 8:01:00 AM

The Verizon Data Breach Investigations Report (DBIR) is back. Now in its tenth year, it’s an unparalleled source of information on cybersecurity threats. The 2017 DBIR reveals what’s really happening in cyber security. This year’s report is based on analysis of over 40,000 incidents, including 1,935 confirmed data breaches. 

Read More

Topics: General Business Owner Articles, Cyber Security

US-CERT: A Great Resource for the Latest Security Activities

Posted by Craig Pollack on Apr 17, 2017 8:31:00 AM

I don't know if you're aware of this or not, but the US-CERT (short for United States Computer Emergency Readiness Team) can be a great resource for some of the most recent patches and updates released by technology companies.

Their mission is to "strive for a safer, stronger Internet for all Americans by responding to major incidents, analyzing threats, and exchanging critical cybersecurity information with trusted partners around the world."

Read More

Topics: General Business Owner Articles, Cyber Security

Microsoft's Latest Security Flaw - Word!

Posted by Craig Pollack on Apr 12, 2017 8:36:00 AM

Once again, a significant security flaw has been uncovered. And this time it's not in any hidden Operating System layer or browser plug-in, but rather it's in one of the staples of the business world - Microsoft Word.

News of the bug spilled out over the past few days.  In it's security advisory, Microsoft said the "critical" rated bug could allow an attacker to take control of an affected system and do things such as install programs or create new accounts with full user rights.

Read More

Topics: General Business Owner Articles, Cyber Security

8 Ways to Protect Your Network Against Ransomware

Posted by Craig Pollack on Apr 5, 2017 8:30:00 AM

Sometimes old becomes new again. Such is the case with ransomware attacks, which have become more and more "popular" over the last few years. First released in 1989, ransomware has now come to be known as that sinister virus that infects a network and “locks out” users from accessing files. Only when the victim agrees to pay a ransom, usually in the form of bitcoins, can the system be unlocked and accessed again.

Read More

Topics: General Business Owner Articles, Cyber Security

Subscribe to LA's Preeminent IT Service Provider Blog