Why is the average cost of cyber liability insurance starting to double from one year to the next, and what can you do about it? In the past, getting a high-quality, affordable policy was as simple as providing your revenue and some basic information about your cyber security controls. Today, you must fill out a detailed annual questionnaire about your…
By Jodi Daniels, Founder & CEO of Red Clover Advisors Our favorite time of the year is finally here—and yes, we know the winter holidays have already come and gone. But as much we may love warming up with a cup of hot cocoa (topped off with unreasonable amounts of marshmallows, please!), there’s one day that holds a special place…
It may seem strange to talk about cybersecurity in terms of “zero trust.” After all, if you can’t trust your systems and applications, why are you using them? But the term actually refers to a cybersecurity best practice that applies the basic concept “Never trust, always verify.” Under the zero-trust security model, no user is trusted with full access to the network just because…
Based on a survey conducted by ResearchCorp.org and sponsored by Xantrion, see how organizations responded when asked how confident they are about the effectiveness of their security measures and see how your company is doing in comparison to those surveyed.
A recent USA Today article explains why our current staffing crunch may take years to abate. Between pandemic-related changes to the workplace and early retirements, organizations are in a fierce competition for employees, including roles like IT that are increasingly important for supporting the primary business or mission. Technology is playing a significant role in helping organizations meet the challenges…
The 2021 California Life Sciences Workforce Trends Report, points to a nationwide staffing crunch in the life sciences industry. Between pandemic-related changes to the workplace and underdeveloped talent pipelines, the life sciences industry is in a fierce competition for skilled employees, both for STEM positions and for secondary roles like IT that are necessary to support scientists.
Fires, floods, ransomware attacks, or pandemics, such as COVID-19, that prevent people from working in the office are all reasons your organization needs a disaster recovery plan. However, while thinking about how to recover from a disaster, don’t forget to include business continuity (a.k.a) disaster avoidance as a cost-effective element of your overall disaster recovery plan. What is the difference between…
When we talk about data security, we’re basically talking about two things: making sure information and applications are available to people who are authorized to use them, and keeping everyone else away. Identity management, also known as identity and access management, is key to our ability to do that. Identity management is the process of defining who you are and what you’re…
Recent headlines have been dominated by stories about the Colonial Pipeline and JBS ransomware attacks. With multi-million-dollar ransoms, operations shut down for days, and the costs associated with investigating and recovering from the attacks, these incidents are stark reminders that businesses need to remain vigilant in their efforts to protect themselves from ransomware. Our state-of-the-art security programs have proven…
Organizations are always looking for ways to effectively manage costs, improve productivity, and scale efficiently. One method proven to help achieve these goals is to outsource IT support to a managed service provider (MSP). We’ve outlined nine key reasons businesses are outsourcing IT support to managed service providers. 1. Cost reduction due to economies of scale in design and operation Problems can be solved once and solutions are shared across a larger scope. The…
Looking for ways to save money on IT support services for your business without sacrificing productivity or functionality? Here are 8 proven ways to help: 1. Standardize your systems Every piece of software and hardware you add to your computer network will have its own issues, both in terms of its own operation and in terms of interoperability with other systems. Say…
By Derik Belair, President and CEO, Augmentt There’s a famous phrase you’ve probably heard before: to err is human. Those words sum up why your security posture needs to focus on human actions–or the absence of them. When seen from this lens, cybersecurity becomes about much more than cleaning up after mistakes. It’s about proactively putting into place measures to…
In the past decade, the number of known malware programs has risen from 65 million to 1.1 billion. The ways in which cybercriminals deploy the malware have also increased in number and sophistication. While advanced security technologies are available to defend against these cyberthreats, many can be thwarted with basic security practices. However, research is showing that many small and mid-sized…
Whether you’re counting the days until you can return to the office or your hoping you can work from home forever, you’ve spent more than enough time working on your home computer by now to know whether it’s up to the task. If you’re starting to realize that it’s not, let us recommend some alternatives from Dell, HP and Lenovo…
Just when you think you and your employees have learned how to recognize and avoid a social engineering attack, the criminals have come up with another way to trick you out of your cash and your sensitive data: the fake LinkedIn profile.
In the work-from-home era, a good headset can make all the difference between being able to focus on your work and, well, sharing distracting or embarrassing background noise with everyone on an important call. But what makes a good headset?
Based on a survey conducted by ResearchCorp.org and sponsored by Xantrion, see how organizations responded when asked how confident they are about the effectiveness of their security measures and see how your company is doing in comparison to those surveyed.
Most companies use direct deposit to pay their employees. In the United States, for example, more than 80% of workers have their paychecks deposited directly into their personal bank accounts. This practice is providing many opportunities for cybercriminals to perpetuate their latest scam — trying to get businesses to deposit employee paychecks into their accounts. Variations of the Direct Deposit…
BYOD (bring your own device) refers to the practice of employees using their personal devices—such as smartphones, laptops, PCs, tablets, and other gear—on the job for the sake of convenience and comfort.
As some workplaces reopen and others make plans to do so, we may start seeing business as usual. However, if the coronavirus re-emerges over the summer or fall due to a decrease in social distancing and other factors, organizations will need to be prepared for a return to remote work and other pandemic-induced workplace changes.
Using free WiFi at airports is convenient but potentially dangerous. According to a Coronet study, these four airports are the riskiest: 1. San Diego International Airport in California. There is a 30 percent chance of connecting to a medium-risk network and a 11 percent chance of connecting to high-risk hotspot at this airport. The researchers even found an “evil twin”…
This past week, we turned our attention to refining our return-to-work strategy. In our opinion, our strategy not only needs to work for us as a business, it also needs to work for clients and employees. To make that happen, we reached out to both for input.
During the hardest times, this quote is especially true—people always remember how you make them feel. In 10 or even 30 years, people will remember the coronavirus pandemic and how their companies made them feel during this unprecedented time.
Although virtual meetings are the new norm, we’ve all attended ones that have gone awry. By taking them as seriously and thoughtfully as physical, in-person meetings, you can use them as a way to be known as someone who’s digitally-savvy and professional—qualities your clients and colleagues will value.
Even though you are no longer working within the protection of your office, you still need to safeguard the privacy of employee, client and business partner information. Follow our ten tips so you don’t let security slip now that you are working at home.
Companies facing a crisis — such as the current COVID-19 pandemic — must identify who will manage the company’s response. In many cases, this involves the creation of a crisis management team, which can help divvy up the many responsibilities.
Now that everyone is working from home, we can’t necessarily rely on communication methods we know and love. We need to branch out and start using new tools that can help us stay connected even though we are apart. One of those new tools is Microsoft Teams.
As we attempt to slow the spread of COVID-19 by working from home, it’s not surprising people are running into Internet issues. We are relying on and stressing our connectivity like never before. If the result of your issues are poor online meeting and video conferencing quality, the following are some recommendations to improve your situation.
One of the less deadly effects of COVID- 19 is the explosion of online scams. COVID-related email phishing attacks have spiked 667 percent since March 1, according to Barracuda. Read this article to learn more about some of the most common scams exploiting coronavirus fears, and some measures you can take to avoid falling for them.
While some of you are veteran remote workers, working from home, especially on a regular basis, might be new for others. The following are some best practices to help guide you through it.