How Natural Disasters Impact Businesses

Guest Author

Business owners can spend many sleepless nights worrying about the myriad disasters that can strike their companies. Will there be a labor dispute? Will the server go down tomorrow? Is an employee going to say something stupid on social media? In any case, being prepared and having a plan for these disasters is key to weathering the storm for any business. However, there’s one type of disaster that shockingly few businesses seem to have detailed plans to deal with, and it’s pretty obvious when you think about it. Many businesses only think about natural disasters in the context of how they’ll get their employees to safety in the moment, but they don’t consider all of the lasting impacts those disasters can have on their ongoing operations.

Read More
Topics: Data Protection

Password Best Practices

Chris Gonzales

The first Thursday of May each year is World Password Day, a celebration to promote better password habits. "Passwords are critical gatekeepers to our digital identities, allowing us to access online shopping, dating, banking, social media, private work and life communications." (Per National Day Calendar)

Read More
Topics: Data Protection

2018 Cybersecurity Trends to Watch

Stephen Tullos

bigstock--141309923-sm.jpgWith the new year looming, all of the Top 10 lists for 2017 are coming out, so we asked our team what does 2018 have in store in regards to cybersecurity. The new year looks grim.

2017 showed the world that hackers have gotten better. Last year, numerous attacks were front-page headlines including the WannaCry Ransomware, NotPetya, Gmail Phishing Attack, and the Netflix Phishing Scam. Plus, Equifax, Deloitte, Verizon, Yahoo, and Uber had large-scale data breaches effecting millions of people worldwide.

Read More
Topics: Data Protection

Bitcoin for Business

Guest Author

Being in the technology industry, we’re regularly asked all things tech and we’ve had a lot of questions concerning Bitcoin lately. We reached out to our local Bitcoin advocate Raina Casbon-Kelts to learn more about what Bitcoin is and why businesses would be interested in it.

Raina writes:

While Americans had Cyber Monday last week where online retailers threw out their best deals, the steadily growing global Cryptocurrency community celebrated Crypto Monday!

Bitcoin is a Global Digital Currency invented by the pseudonymous Satoshi Nakamoto. The intention of Bitcoin is the decentralization of money, returning person-to-person transactions to the world and eliminating the middle men like Visa, MasterCard, Amex, and even banks.

Read More
Topics: Data Protection

How Consumers Can Protect Themselves Online on Cyber Monday

Stephen Tullos

Cybersecurity is top of mind for many business leaders thanks in part to Ransomwares like WannaCry and HIPAA data breaches being in the headlines nearly every month this year. With that in mind and Cyber Monday around the corner, we put together this list of ways consumers can protect themselves from identity theft, hacked accounts, and cybercrimes.

Every method and piece of advice on this list is free, requiring consumers to take a step back or have a wary eye for small details.

Read More
Topics: Data Protection

Ask a Cyber-Risk Insurance Agent

Guest Author

After our post, Do I Need Cyber Insurance [For My Business], we received notes from clients and friends thanking us for bringing this to their attention. We also got a lot of questions. We asked insurance agents in the New Orleans area that we knew specialized in cyber risk insurance to help educate all of us. Bradley Nolan with Donnaway Insurance graciously agreed to do an interview with us about the topic.

My IT - How has the cyber-risk insurance market changed in the past 3-5 years?

BN - Many new insurers entered the market recently. Previously, the market had a handful of traditional carriers with over a decade of underwriting & claims experience. Now with new insurers playing in the market, there are untested policy contracts due to them having little experience dealing with cyber and data losses. These companies that are new to the sector do not have the claims support infrastructure and technology vendor network to investigate and assess claims immediately so their pricing, underwriting coverage, and claim response is largely unknown.

Read More
Topics: Data Protection

Biggest Security Risk: Your CEO

Patrick Leonard

Research on Cybersecurity repeatedly shows that a company’s biggest asset is also their biggest risk, their employees. Companies are more susceptible and more likely to be attacked internally by an employee, whether malicious or accidental, than by a hacker outside the company. Furthermore, a company’s CEO and other C-suite executives are the biggest targets for hackers, which has led to a new term in cybersecurity – whaling. A whaling attack is a phishing attack or scam that targets a “big fish”, a company’s executive. (Phishing is the attempt to obtain sensitive information such as usernames, passwords, and financial records, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.)

Read More
Topics: Data Protection

Cybercrime Myths Costing You Money

Stephen Tullos

Criminals make millions of dollars off naïve, unwittingly victims every year because of common myths regarding cybersecurity. The scariest part of cybercrime is that it is mostly preventable and affordable, but SMB owners and executives need to stop pretending like it can’t happen to them.

Read More
Topics: Data Protection

What is Advanced Threat Protection (ATP) for Email?

Patrick Leonard

Advanced Threat Protection (ATP) can mean a lot of things, but when describing an email feature, it is a tool created to stop email threats from hitting your inbox. Since the majority of ransomware and other viruses enter a company’s network via malicious email attachments and links, it is imperative that companies do what they can to minimize their risk of a cyber-attack. (Note – ATP is called ATD by some companies, which stands for Advanced Threat Detection. For the most part, the difference in wording is semantics, but some companies use the two terms to denote email protection versus firewall protection.)

Read More
Topics: Data Protection

What is Two-Factor Authentication (2FA)?

Patrick Leonard

Two-Factor Authentication is an extra layer of security that requires more than just the user’s name and password. To gain access, the user must present something via a different method such as a token, fingerprint, web cookie, or code from a text message or authentication application like Google Authenticator. Two-Factor Authentication is known as 2FA for short, or even Two-Step Verification (TFA). For comparison, Single-Factor Authentication (SFA) only requires your username and password, and it is still the most common form of access because of its low cost and ease of use, but a hacker can breach most password-based security systems easily.

Read More
Topics: Data Protection

About My IT's Blog

We believe an educated client is the best client, therefore, we share our knowledge with executives and business owners looking for a fair, knowledgeable IT firm that fits well with their company and objectives.

My IT helps companies to protect their data, become more efficient and productive, and to boost high-growth using technology. In our blog, we discuss these topics and our extensive expertise working with medical practices, construction industry companies, and auto dealerships.

New Call-to-action

Share This Page

    

Subscribe to Email Updates

Real Time Web Analytics