Blog

Beware of these 4 types of hackers

Beware of these 4 types of hackers

Hackers come in all shapes and sizes. From kids wanting to gain notoriety on the internet to political groups trying to send a message, the motives for a cyberattack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better.

4 Social engineering scams to watch out for

4 Social engineering scams to watch out for

Experts are constantly creating new security systems to protect individuals and businesses from hackers. From those who want to attend popular events like the Olympics to avoiding an angry boss, hackers are preying on gullible victims to circumvent network security systems and steal sensitive information.

IT security policies your company needs

IT security policies your company needs

When it comes to Internet security, most small businesses don’t have security policies in place. And considering that employee error is one of the most common causes of a security breach, it makes sense to implement rules your staff needs to follow. Here are four things your IT policies should cover.

Do you need a CIO?

Do you need a CIO?

(Hint: YES!)

What is the job of a CIO, exactly? Chief Information Officer. Isn’t that just IT?

Well, yes. And, no.

A CIO has many roles in an organization. IT is one role--- understanding computer systems, networking, SaaS, security, standards, etc.

Regularly evaluate your cybersecurity

Regularly evaluate your cybersecurity

Experts estimate that the global market for cybersecurity products this year will exceed that of last year. At first glance, an increase in spending seems necessary and shows that businesses are becoming more aware of cybersecurity issues. But a closer look may prove otherwise.

Tips to reduce risks after a security breach

Tips to reduce risks after a security breach

No company is completely safe from data breaches. For proof, look no further than companies like Yahoo, AOL, and Home Depot, which compromised millions of personal customer information. That said, no business is completely helpless, either. The following steps can minimize the risks to your business in the event of a large-scale data breach.

Why Look for Trouble? Doing a Technology Gap Review

Why Look for Trouble?  Doing a Technology Gap Review

“But I’ve got managed IT services, a great help desk, and my servers are safely in the private cloud. Why would I need to do a Technology Gap Review?”

It’s a good question.  And the answer is another question:  Now that you’ve got your infrastructure all taken care of with designDATA’s help, what about the 43 other pieces of software you’re using to manage your organization? Are they all serving your mission and supporting your goals?

A Technology Gap Review takes a look at how you do business using technology.

Microsoft Office 365 to block Flash

Microsoft Office 365 to block Flash

A few weeks ago, Microsoft made an announcement to block future content that is embedded with Adobe Flash, Shockwave, and even their own Silverlight platform from Office 365. While the developers have their reasons for implementing this, they should have pulled this feature earlier to avoid many irate customers.

Cybersecurity and Today’s CFO

Cybersecurity and Today’s CFO

CFOs can no longer respond with “that’s not my department” when it comes to cybersecurity. In a recent article by Harvard Business Review, CFOs were outed for not taking an active role in their organization’s cybersecurity efforts. Today’s financial executive must focus on more than managing financial risk—they must become an engaged member of the security team.