Call (716) 373-4467

Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used from anywhere.

We’re seeing the takeover of many activities that used to be performed on traditional computers. Now, people are using mobile devices instead.

For example, Microsoft estimates that up to 80% of the workload in many enterprise organizations is now done via mobile devices. Over half of all web searches are also now conducted from a mobile device rather than a desktop PC.

This has caused mobile devices to become more targeted over the past few years. As hackers realize they’re holding many of the same sensitive information and app access as PCs, they’ve been creating mobile malware and other exploits to breach mobile devices.

In 2020, approximately 36.5% of organizations were impacted by mobile malware and 2.5 million people unknowingly downloaded multiple mobile adware apps.

It’s important to start treating mobile devices in the same way as you do computers when it comes to their security. Smartphones and tablets need the same types of security precautions in place, including:

  • Antivirus/anti-malware
  • DNS filtering
  • Automated OS and app updates
  • Managed backup

You need to be on the lookout for the most prevalent mobile device threats that allow your data to be leaked or breached. Here’s a roundup of what those are.

1. Mobile Malware Hidden in Apps

It’s not easy at first glance to tell the difference between a legitimate free app and one that has malware hidden inside.

Scammers will use the same types of flashy graphics, and the app may even have a high star rating (most likely boosted through suspicious means). The app may even do what it says it will do when downloaded.

But malware can be hidden in the background, infecting a device as soon as the app is installed. And many of these apps will hide once on your phone or tablet by using the icon of a common default system app (like settings or calendar).

Mobile malware can include all the same types of malware that can infect a computer, such as ransomware, adware, spyware, trojans, and more.

2. Unprotected Communications

Have you ever sent someone a password or credit card details over a text message or messaging app? Did you check to see if the communication was encrypted?

Many users will use various methods of communication from their mobile devices without knowing how secure those methods are. If sensitive information is transmitted and it’s not encrypted, then a hacker could easily intercept it.

3. Public Wi-Fi and Man-In-The-Middle Attacks

Public Wi-Fi has long been known to be non-secure, yet people still use it when it’s available. They want to save their mobile minutes or get a faster connection.

75% of people admit to connecting to email when on public Wi-Fi. Other activities people will do is sign into apps (even sensitive ones like online banking), and shop online, entering credit card details.

If you’re on public Wi-Fi, then you’re at high risk of a man-in-the-middle attack. This is when a hacker connects to the same network and looks for victims with unprotected communications. They can then capture any type of data they’re transmitting.

One way to safely connect to public Wi-Fi is to use a VPN app, which will encrypt your communications.

4. Juice Jacking on Public USB Charging Stations

Another public mobile breach danger is public USB charging stations. These are often welcome sights especially if you’re low on battery power. However, hackers can infect public USB charging ports with malware and set up fake charging stations in public areas.

Then, when you insert your USB cord to charge your device, the malware is copying all the data on your phone and/or infecting it with malicious code. See, USB cables aren’t just for charging, they are also used for data transmission.

It’s best to avoid public USB charging ports and charge with your power adapter that plugs into an outlet instead. You can also buy a “charge-only” USB cord to use if USB charging is your only option.

5. Non-Updated Devices

Approximately 40% of Android devices are running outdated operating systems that no longer get vital security updates.

When your mobile device is not kept updated, then it’s easier for a hacker to use an exploit that takes advantage of a code vulnerability in the OS or one of the installed apps.

Many companies aren’t paying attention to how many employees’ work devices are running current operating systems, which puts their networks at higher risk of a breach.

You should ensure that all your apps and your OS are kept updated because many of these updates include critical security patches.

ASK US ABOUT MOBILE DEVICE SECURITY SOLUTIONS

With mobile devices handling so much of the computing workload these days, it’s vital they’re properly protected. Contact us today at 716-373-4467 x 15 or [email protected] to discuss mobile security and management solutions. 

 

Article used with permission from The Technology Press.

Public networks expose your business to security threats. Switching to a VPN can greatly help in reducing those threats.

Many companies rely on public networks for communication and data sharing. It allows them to cut costs and allocate their funds elsewhere. 

However, it also raises several security issues. 

For starters, the network provider might be monitoring the activity, which gives them access to customer details, emails, and critical files. As a result, sensitive information can end up in the wrong hands, compromising the organization’s reputation. 

Another potential consequence is losing access to bank accounts, credit cards, and invaluable resources. These issues can lead to huge losses for any business.

Your business might be facing the same risk whenever a team member connects to a public network. 

To eliminate it, you need to switch to a virtual private network (VPN). They offer online anonymity and privacy, enabling you to conduct your operations away from prying eyes. 

Still, you can’t go for just any VPN. This article features the 10 factors to consider when choosing the right one.

The 10 Factors for Choosing a VPN

Factor 1. Location

The location of your VPN servers is essential for a few reasons. 

For example, the greater the distance between your server and your business, the higher the chances of facing latency issues. That’s why to ensure a seamless surfing experience, stick to the nearest server available. 

Furthermore, you can also consider a VPN from the same place as the content your team needs to access to overcome geographic restrictions. If your work requires research from the UK, for example, find servers from that country. 

Factor 2. Price

Using free VPNs might be tempting, but they deliver a lackluster experience. To start with, they can log you out of internet activities and are often chock-full of disruptive ads. 

You’re much better off investing in a paid platform. They come with various robust features, a larger number of servers, and configurations to bolster your security. 

Factor 3. Device Compatibility

Another detail you should consider is the compatibility of your VPN.

In most cases, you need software that can work with several devices, such as your smartphone, laptop, and tablet. Otherwise, cross-platform work will suffer.

Factor 4. Capacity

Before choosing your VPN, make sure to determine the amount of data you can use. That means if your operations warrant tons of online resources, you should pick a solution that supports considerable data allocation. 

Moreover, check the number of online servers. The higher the number, the more efficiently your platform can support resource-intensive tasks. 

Factor 5. Protocol Support

Protocols are rules that stipulate connections between the client (software on your device) and the server. 

There are different protocols, but the most widely used ones include PPTP, OpenVPN, IPSec, SSL, SSH, and SSTP. Each offers varying speeds and levels of security, both of which are vital to your company. 

For instance, OpenVPN is an open-source protocol and one of the safest options for enterprises. It runs on 256-bit encryption keys and advanced ciphers, offering robust protection against cyberattacks. Plus, it features excellent firewall compatibility.

Factor 6. Data Logging Policies

VPNs log user data to streamline customer support and limit available connections. However, you need to consider what information they’re logging. 

In most cases, this includes session times and IP addresses. But some providers can also log your software, downloaded files, and web pages you visit. 

When looking for a suitable VPN, be sure to read the data logging policy to determine the information the app will store. You should also verify the company is transparent; if someone tries to deceive you, turn down their offer. 

Factor 7. Availability of a Kill Switch

No cybersecurity measure is fail proof – VPNs are no exception. Overloaded platforms can trigger IP leaks, interrupting your private connection and exposing your true address when online. 

To avoid this scenario, look for platforms with a built-in kill switch. It disrupts your devices’ access to the internet in case of IP leaks. The kill switch stops transfers of unencrypted information and can help prevent cybercriminals from obtaining your data. 

Factor 8. Updates

Your VPN provider needs to roll out regular updates to ensure you can perform your operations safely and efficiently. 

If they don’t openly specify the update frequency on their webpage, find out when the last update was on your app store. It should give you a clue on how frequently the updates get sent out.

Factor 9. Centralized Management

Centralized management enables you to control VPN distribution more easily, allowing you to manage access permissions and user accounts. Some of the best apps even feature gateway or role-based access management. It permits users to access only those segments of the network they need to perform their jobs. 

Another important consideration here is control from your console. IT administrators should have permission to open and delete accounts as well as check the devices linked to the platform. 

Lastly, your organization might benefit from VPNs with IP whitelisting. They allow administrators to approve the IP addresses of your enterprise to ensure only members with a verified IP can use corporate resources. This feature provides granular control over network accessibility.

Factor 10. Customer Support

Customer support might be the most significant factor. Your provider should be easy to contact through different portals such as telephone and email. 

Easy accessibility lets you inform the VPN developer about various issues. For instance, they can help restore your network if it goes down and prevents unwanted exposure. 

Most client support teams are highly accessible, but make sure to verify this by reading customer reviews. 

SAFEGUARD AGAINST CYBERATTACKS WITH A BULLETPROOF VPN

Loss of data can happen at any time, which can give your competitors the upper hand and tarnish your reputation. Switching to a VPN can greatly increase your businesses cybersecurity. Users will also need to enable multi-factor authentication when they are connecting to a business network via a VPN connection, and Databranch can help identify and configure the best solution.

Contact us today at 716-373-4467 x 15 or [email protected] if you would like to discuss your VPN options. You’ll also want to patch up any other cybersecurity vulnerabilities and we can help you make that happen. 

 

Article used with permission from The Technology Press.

Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack.

With data and business processes now largely cloud-based, a user’s password is the quickest and easiest way to conduct many different types of dangerous activities.

Being logged in as a user (especially if they have admin privileges) can allow a criminal to send out phishing emails from your company account to your staff and customers. The hacker can also infect your cloud data with ransomware and demand thousands of dollars to give it back.

How do you protect your online accounts, data, and business operations? One of the best ways is with multi-factor authentication (MFA).

It provides a significant barrier to cybercriminals even if they have a legitimate user credential to log in. This is because they most likely will not have access to the device that receives the MFA code required to complete the authentication process.

What are the Three Methods of MFA?

When you implement multi-factor authentication at your business, it’s important to compare the three main methods of MFA and not just assume all methods are the same. There are key differences that make some more secure than others and some more convenient.

Let’s take a look at what these three methods are:

1. SMS-Based

The form of MFA that people are most familiar with is SMS-based. This one uses text messaging to authenticate the user.

The user will typically enter their mobile number when setting up MFA. Then, whenever they log into their account, they will receive a text message with a time-sensitive code that must be entered.

2. On-Device Prompt in an App

Another type of multi-factor authentication will use a special app to push through the code. The user still generates the MFA code at login, but rather than receiving the code via SMS, it’s received through the app.

This is usually done via a push notification, and it can be used with a mobile app or desktop app in many cases.

3. Security Key

The third key method of MFA involves using a separate security key that you can insert into a PC or mobile device to authenticate the login. The key itself is purchased at the time the MFA solution is set up and will be the thing that receives the authentication code and implements it automatically.

The MFA security key is typically smaller than a traditional thumb drive and must be carried by the user to authenticate when they log into a system.

Now, let’s look at the differences between these three methods.

What is the Most Convenient Form of MFA?

Users can often feel that MFA is slowing them down. This can be worse if they need to learn a new app or try to remember a tiny security key (what if they lose that key?).

This user inconvenience can cause companies to leave their cloud accounts less protected by not using multi-factor authentication.

If you face user pushback and are looking for the most convenient form of MFA, it would be the SMS-based MFA.

Most people are already used to getting text messages on their phones so there is no new interface to learn and no app to install.

What is the Most Secure Form of MFA?

If your company handles sensitive data in a cloud platform, such as your online accounting solution, then it may be in your best interest to go for security.

The most secure form of MFA is the security key.

The security key, being a separate device altogether, won’t leave your accounts unprotected in the event of a mobile phone being lost or stolen. Both the SMS-based and app-based versions would leave your accounts at risk in this scenario.

The SMS-based is actually the least secure because there is malware out there now that can clone a SIM card, which would allow a hacker to get those MFA text messages.

A Google study looked at the effectiveness of these three methods of MFA at blocking three different types of attacks. The security key was the most secure overall.

Percentage of attacks blocked:

  • SMS-based: between 76 – 100%
  • On-device app prompt: between 90 – 100%
  • Security key: 100% for all three attack types

What is in Between?

So, where does the app with an on-device prompt fit in? Right in between the other two MFA methods.

Using an MFA application that delivers the code via push notification is more secure than the SMS-based MFA. It’s also more convenient than needing to carry around a separate security key that could quickly become lost or misplaced.

Looking for Help Setting up MFA at Your Company?

Multi-factor authentication is a “must-have” solution in today’s threat climate. Let’s discuss your barrier points and come up with a solution together to keep your cloud environment better secured.

Contact Databranch today at 716-373-4467 x15 or [email protected], we’d be happy to help you out.

 

Article used with permission from The Technology Press.

The reality is, mobile devices are less safe than desktop computers. Boosting security on such devices is essential if you use them in business. 

Technological breakthroughs have streamlined your operations in several ways. Primarily, you can now use mobile devices to make your communication and data sharing more convenient.

But this technological advancement also means that information on your team members’ mobile devices is no longer limited to just phone numbers and contacts. They now contain much more significant data, such as emails, passwords, and other account details. 

That’s why keeping those mobile devices secure is key to shielding your reputation and minimizing the risk of losing money. 

Unfortunately, the protection of tablets and smartphones against cyberattacks isn’t as robust as that of desktops and laptops. Anti-malware applications may be present, but they’re not as powerful as their computer counterparts. In addition, many devices don’t support certain measures and applications that companies develop to enhance business security. 

Fortunately, you can still implement robust safety measures to protect your smartphones and tablets. 

This article will cover the nine best practices in improving cybersecurity on mobile devices.

The Nine Practices:

Practice 1:  Establish a Sound Security Policy

Before issuing tablets or smartphones to your teams, create an effective usage policy. Define rules about acceptable use and determine the penalties for violating them. 

Your employees must be aware of the security risks and measures that can help them reduce the risks. They should know that they are the first line of defense against cybercrime. 

Furthermore, be sure to develop a BYOD (Bring Your Own Device) policy if you permit your team to use a personal device for business. Your company policy can include the following: 

  • Requirements for the installation and remote software wiping on any personal device that stores or accesses company data
  • Employee training and education on safeguarding company information when using wireless networks on their mobile devices
  • Data protection methods that include automatic locking or other security measures applicable after long inactivity periods
  • Protocols for lost and stolen devices 
  • The use of security software and antivirus platforms 
  • Backup requirements 

Practice 2:  Ensure the Operating System is Up to Date

Updating Android and iOS operating systems improve overall user experience, but their most significant role is in addressing security vulnerabilities. 

Therefore, install updates as soon as the developer rolls them out to reduce exposure to cybersecurity threats. Delaying it may give criminals enough time to attack your weaknesses and take advantage of outdated operating systems.

Practice 3:  Enable Password Protection

A complex password or PIN can help prevent cybercriminals from accessing mobile devices. Besides using alphanumeric combinations, you can also use facial or fingerprint recognition, depending on what suits your employees. 

If you opt for digits and letters, don’t share the combination with people outside your company. On top of that, be sure that your staff doesn’t store them on their phones. Unmarked folders and physical wallets are a much safer option. 

Practice 4:  Only Install Business Programs 

Lenient download policies can allow your team members to install non-business apps. Downloading such apps might seem harmless, but they are also infamous for their harmful advertising codes and many other threats. 

To mitigate this risk, tell your employees they can only download and use apps necessary for their roles.

Practice 5:  Avoid Connecting to Public Wi-Fi 

Your team may need to use public Wi-Fi networks in emergencies to send crucial emails or schedule a meeting. However, connecting to such networks can expose confidential company information to cybercriminals using the same network. 

The easiest way to minimize this risk is to provide a high-quality internet plan that features roaming services for your remote workers. 

But if there’s no way to avoid public Wi-Fi connections, a reputable virtual private network (VPN) or secure global network (SGN) may do the trick. It can help shield your data by creating direct, secure links from your location to the intended website. 

Practice 6:  Leverage Phone Tracking

Losing company-issued mobile devices is unfortunate, but it’s not the end of the world. 

Enabling Android Phone Tracker, Find My Phone on iOS, or other device-tracking software can help locate your lost smartphones. Some programs also enable you to remove data on your stolen devices remotely. 

Installing these apps takes a couple of minutes and gives you much-needed peace of mind. With it, even if your staff loses their mobile device, cybercriminals are less likely to get their hands on the content.

Practice 7:  Incorporate Mobile Device Management Software

For even more security, you may want to integrate with reliable MDM. It’s an excellent way to separate personal and business information while allowing your team members to set up robust security measures on their devices. 

In most cases, cloud-based software is the most affordable, flexible, and manageable type of MDM. Many platforms let you check out device information, update and manage apps, configure your devices, create usage restrictions, and remove content remotely. 

If possible, implement MDM software that enforces security measures across all devices. As previously mentioned, this can include data encryption, strong passwords, and setting up containers to separate personal information from enterprise data. 

Practice 8:  Screen Messages Carefully

Cybercriminals frequently employ SMS phishing to trick your team into clicking dangerous links. They pose as someone credible, asking your staff to share confidential information. 

If your employees encounter such messages, they should delete them or alert the IT department. Another great idea is to avoid opening the SMS and block the sender. 

Practice 9:  Blocking and Whitelisting

Many threats can compromise your company due to employee errors. For example, a team member may not realize they’re downloading a malicious app that allows thieves to steal data from their mobile devices. 

Blocking and whitelisting can enable you to protect your employees from these risks by determining which sites and apps are safe. 

On one hand, blocking certain applications can give your IT department peace of mind and alert them when someone tries to access those applications.

On the other hand, whitelists can work great for highlighting the tools your team should prioritize over social media and games. 

Don’t Drop Your Guard

Your employees may still use their mobile devices to send emails and share sensitive information. That’s why shielding them from cybercriminals should be a top priority. 

So, develop a strict usage policy and follow other recommended practices to make your team’s smartphones and tablets virtually impervious to data theft. 

Get in touch with us today at 716-373-4467 x 15 or [email protected] to arrange a quick chat to learn more about your options and how we can help you identify and address any potential security risks.

 

Article used with permission from The Technology Press.

Conducting a vulnerability assessment is important because the exercise will identify security flaws that exist in your IT environment before they are discovered by a malicious computer hacker. Once the vulnerabilities are discovered you can correct them and lower your risk of becoming a victim of a cybersecurity attack.

What Will a Vulnerability Assessment Do?

A vulnerability assessment will discover common security weaknesses such as:

  • Operating systems and applications that are not current with the latest security updates or patches.
  • Unsecure legacy operating systems that are no longer supported by manufacturer.
  • Open ports on perimeter defenses and other devices that allow malicious attackers to easily gain access to your private computer network.
  • All Common Vulnerabilities and Exposures (CVE) that exist on the computer network.

Common Vulnerabilities and Exposures (CVE) is a database of publicly disclosed information security issues. There are currently over 163 thousand CVE records catalogued and made publicly available by the CVE program. You can explore the database at www.cve.org.

Why does this matter? Because it is important to recognize that new information security flaws are discovered regularly and then shared publicly. Sharing the information is not restrictive. Everyone can search the CVE database, including the hackers that intend to attack your computer network!

What Happens After the Assessment?

Executing routine vulnerability assessments will discover all the known vulnerabilities on your network before the bad actors have an opportunity to exploit them. Vulnerability assessments are nonintrusive and not disruptive.

Typically, a vulnerability assessment can be completed in a day or two. The results of a vulnerability assessment are documented and provided to the stakeholder complete with recommendations around remediating any weaknesses found.

It is important to conduct vulnerability assessments regularly, at least every quarter if not more frequently. This is due to the dynamic nature of information technology. Many changes occur on a day-to-day basis that can introduce new exposures associated with information security. Examples include:

  • The introduction or removal of employees and business process.
  • The implementation or elimination of hardware, software, or business applications.
  • Configuration changes made to any element of the technology environment.
  • Newly discovered bugs and flaws found in off the shelf commercial software products.

Security shortcomings found during a vulnerability assessment can almost always be fixed. Many times, the fixes are very easy to accomplish. Roughly 60% of all reported cybersecurity breaches occurred because the bad actors exploited common vulnerabilities and exposures (CVE).

This means that roughly 60% of all reported cybersecurity breaches could have been prevented if the victim had simply conducted a vulnerability assessment and made small improvements to their cybersecurity posture that would have eliminated a substantial amount of risk. 

Interested in setting up a vulnerability assessment? Contact Databranch today at 716-373-4467, [email protected] , or click here to set up a meeting with one of our experienced team members.
 
Content was provided courtesy of CyberStone.

Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack.

Malware is an umbrella term that encompasses many different types of malicious code. It can include:

  • Viruses
  • Ransomware
  • Spyware
  • Trojans
  • Adware
  • Key loggers
  • And more

The longer that malware sits on your system unchecked, the more damage it can do. Most forms of malware have a directive built in to spread to as many systems as possible. So, if not caught and removed right away, one computer could end up infecting 10 more on the same network in no time.

Early detection is key so you can disconnect an infected device from your network and have it properly cleaned by a professional.

Keep an eye out for these key warning signs of malware infection so you can jump into action and reduce your risk.

Strange Pop-Ups on Your Desktop

Some forms of malware can take on the disguise of being an antivirus app or warranty notice that pops up on your screen. Hackers try to mimic things that users may have seen from a legitimate program, so they’ll be more apt to click without thinking.

If you begin to see a strange “renew your antivirus” subscription alert or a warranty renewal that doesn’t quite make sense, these could be signs that your PC has been infected with adware or another type of malware.

New Sluggish Behavior

Computers can become sluggish for a number of reasons, including having too many browser tabs open at once or running a memory-intensive program. But you’ll typically know your computer and the types of things that slow it down.

If you notice new sluggish behavior that is out of the ordinary, this could be an infection. One example would be if you don’t have any programs open except notepad or another simple app, and yet you experience freezing.

When malware is running in the background, it can often eat up system resources and cause your system to get sluggish.

Applications Start Crashing

Applications should not just crash out of the blue. There is always a reason. Either the software is faulty, there’s been an issue with an update, or something else may be messing with that application’s files.

If you suddenly experience apps crashing, requiring you to restart the app or reboot your system, this is another telltale sign that a virus, trojan, or other malicious code has been introduced.

Your Browser Home Page is Redirected

If you open your browser and land on a homepage that is not the one you normally see, have your PC scanned for malware right away. Redirecting a home page is a common ploy of certain types of malware.

The malware will infect your system and change the system setting for your default browser home page. This may lead you to a site filled with popup ads or to another type of phishing site.

Just trying to change your homepage back in your settings won’t fix the situation. It’s important to have the malware removed.

Sudden Reboots

Another annoying trait of certain types of malicious code is to make your system reboot without warning.

This can cause you to lose the work you’ve just done and can make it difficult to get anything done. This may happen when malware is changing core system files behind the scenes. With files corrupted, your system becomes unstable and can often reboot unexpectedly.

You’re Missing Hard Drive Space

If you find that a good deal of your hard drive space that used to be open is now gone, it could be a malware infection taking up your space. Some types of malware may make copies of files or introduce new files into your system.

They will cleverly hide, so don’t expect to see the word “malware” on a file search. Instead, the dangerous activities will usually be masked by a generic-sounding name that you mistake for a normal system file.

You Run Across Corrupted Files

If you open a file and find it corrupted, this could be a red flag that ransomware or another form of malware has infected your system.

While files can occasionally become corrupt for other reasons, this is a serious issue that deserves a thorough malware scan if you see it.

PC “Processing Sounds” When There Shouldn’t Be

Most of us are familiar with those “thinking sounds” when our computer is processing something memory intensive. You’ll usually hear a type of whirring that will go away once you finish that activity.

If you begin hearing this processing sound when you’re not doing anything particularly intense on your computer, this could be a sign that malware is running in the background and it should be checked out.

Free online malware and virus scans are not always very reliable. We recommend working with a managed services provider like Databranch to ensure your entire system is cleaned properly and that detection tools are put into place to alert you to potential malware. Contact Databranch today at 716-373-4467 x 15 or [email protected], or submit the form below, if you would like to enhance your security and review our Foundation Security platform for your business. 

Request your Free Baseline Security Assessment here:

 

Article used with permission from The Technology Press.

Administrative Privileges AI algorithms Annual Security Training Anti-Virus Artificial Intelligence Authenticator App Backup and Recovery Backup Redundancy BCDR breach prevention Breach Prevention Platform Breaches business continuity Business Email Compromise Business Email Compromises Business Phone System Business Software BYOD Call Directory Cisco Cloud Accounts Cloud Infrastructure Cloud Security Cloud Solutions Comprehensive Cybersecurity Compromised Credentials computer support Computer Upgrades Conditional Access Credential Theft Cyber Attacks Cyber Criminals Cyber Defenses Cyber Insurance cyber liability insurance Cyber Risk Management Cyberattacks Cyberinsurance cybersecurity Cybersecurity Awareness month Cybersecurity Breach Cybersecurity Culture Cybersecurity Training Cybersecurity Webinar Dark Web Dark Web Monitoring Data Backup Data Backup and Recovery Data Backup Solution Data Breach Data Breaches Data Governance Data Management Data Privacy Compliance Data Privacy Regulation data protection Data Recovery Data Restoration deepfake Deepfakes Defense in Depth Denial of Service Device Security Disaster Recover Disaster Recovery DNS Filtering doug wilson employee cybersecurity training Endpoint Detection and Response field technician Foundation Security Gift Card Scams Hackers Hosted VoIP i.t. service provider Identity Theft incident response plan Incident Response Planning Insider Threats Internet Explorer Internet of Things Intrusion Detection Intrusion Prevention IoT Devices IT Compliance IT Infrastructure IT Myths IT Partner IT Policies IT Resource IT Security IT Service Provider IT Services Juice Jacking Local Admin local admin privileges Lost Devices M365 malware Managed Clients Managed IT managed service provider managed services Manages Services MFA Microsoft Microsoft 356 Microsoft 365 Copilot Microsoft Office Mobile Devices MSP MSP501 Multi-Factor Authentication Network Monitoring Network Security Network Testing New Computer NIST Framework Offboarding Office 365 Outlook Outsourced IT Password Manager Password Managers Password Protection password security Passwords Patch Management Patches Patching PC Performance Penetration Testing Personal Data phishing Phishing Attacks PII Proactive Monitoring Processor productivity Professional Tune-Up Public WiFi Push-Bombing RAM Ransomware Ransomware Prevention Recovery Time Calculator Remote Monitoring Remote Working repeatbusinesssystems Ring Groups risk assessment Risk Management Risk Tolerance Rock-It VoIP RTO Costs Scammers Scams security Security Assessment Security Awareness Training Security Defaults Security Key Security Scans SLAM Method Smishing SMS Social Engineering Social Media Security Solid-State Drive Sponsored Google Ads SSD stolen credentials Storage Teams technical support scam technology best practices Technology Management Technology Policies Technology Review Threat Detection Threat Identification Threat Modeling Updates virus VoIP Systems VPN Vulnerabilities Vulnerability Assessment Warning Signs Webinar Windows 8.1 Work Computers World Backup Day