Bitcoin for Business

Guest Author

Being in the technology industry, we’re regularly asked all things tech and we’ve had a lot of questions concerning Bitcoin lately. We reached out to our local Bitcoin advocate Raina Casbon-Kelts to learn more about what Bitcoin is and why businesses would be interested in it.

Raina writes:

While Americans had Cyber Monday last week where online retailers threw out their best deals, the steadily growing global Cryptocurrency community celebrated Crypto Monday!

Bitcoin is a Global Digital Currency invented by the pseudonymous Satoshi Nakamoto. The intention of Bitcoin is the decentralization of money, returning person-to-person transactions to the world and eliminating the middle men like Visa, MasterCard, Amex, and even banks.

Read More
Topics: Data Protection

How Consumers Can Protect Themselves Online on Cyber Monday

Stephen Tullos

Cybersecurity is top of mind for many business leaders thanks in part to Ransomwares like WannaCry and HIPAA data breaches being in the headlines nearly every month this year. With that in mind and Cyber Monday around the corner, we put together this list of ways consumers can protect themselves from identity theft, hacked accounts, and cybercrimes.

Every method and piece of advice on this list is free, requiring consumers to take a step back or have a wary eye for small details.

Read More
Topics: Data Protection

Ask a Cyber-Risk Insurance Agent

Guest Author

After our post, Do I Need Cyber Insurance [For My Business], we received notes from clients and friends thanking us for bringing this to their attention. We also got a lot of questions. We asked insurance agents in the New Orleans area that we knew specialized in cyber risk insurance to help educate all of us. Bradley Nolan with Donnaway Insurance graciously agreed to do an interview with us about the topic.

My IT - How has the cyber-risk insurance market changed in the past 3-5 years?

BN - Many new insurers entered the market recently. Previously, the market had a handful of traditional carriers with over a decade of underwriting & claims experience. Now with new insurers playing in the market, there are untested policy contracts due to them having little experience dealing with cyber and data losses. These companies that are new to the sector do not have the claims support infrastructure and technology vendor network to investigate and assess claims immediately so their pricing, underwriting coverage, and claim response is largely unknown.

Read More
Topics: Data Protection

Biggest Security Risk: Your CEO

Patrick Leonard

Research on Cybersecurity repeatedly shows that a company’s biggest asset is also their biggest risk, their employees. Companies are more susceptible and more likely to be attacked internally by an employee, whether malicious or accidental, than by a hacker outside the company. Furthermore, a company’s CEO and other C-suite executives are the biggest targets for hackers, which has led to a new term in cybersecurity – whaling. A whaling attack is a phishing attack or scam that targets a “big fish”, a company’s executive. (Phishing is the attempt to obtain sensitive information such as usernames, passwords, and financial records, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.)

Read More
Topics: Data Protection

Cybercrime Myths Costing You Money

Stephen Tullos

Criminals make millions of dollars off naïve, unwittingly victims every year because of common myths regarding cybersecurity. The scariest part of cybercrime is that it is mostly preventable and affordable, but SMB owners and executives need to stop pretending like it can’t happen to them.

Read More
Topics: Data Protection

What is Advanced Threat Protection (ATP) for Email?

Patrick Leonard

Advanced Threat Protection (ATP) can mean a lot of things, but when describing an email feature, it is a tool created to stop email threats from hitting your inbox. Since the majority of ransomware and other viruses enter a company’s network via malicious email attachments and links, it is imperative that companies do what they can to minimize their risk of a cyber-attack. (Note – ATP is called ATD by some companies, which stands for Advanced Threat Detection. For the most part, the difference in wording is semantics, but some companies use the two terms to denote email protection versus firewall protection.)

Read More
Topics: Data Protection

What is Two-Factor Authentication (2FA)?

Patrick Leonard

Two-Factor Authentication is an extra layer of security that requires more than just the user’s name and password. To gain access, the user must present something via a different method such as a token, fingerprint, web cookie, or code from a text message or authentication application like Google Authenticator. Two-Factor Authentication is known as 2FA for short, or even Two-Step Verification (TFA). For comparison, Single-Factor Authentication (SFA) only requires your username and password, and it is still the most common form of access because of its low cost and ease of use, but a hacker can breach most password-based security systems easily.

Read More
Topics: Data Protection

6 Critical Steps SMBs Need to Protect Themselves from Ransomware

Stephen Tullos

Cybersecurity is all over the news thanks to WannaCry’s high-profile attack on NHS (National Health Service) and more than 200,000 systems in over 150 countries. Yet, many companies were unaffected because they fortified themselves against such cyber-attacks. How does a small to mid-sized company prevent a cyber-attack such as one with the reach of WannaCry?

Read More
Topics: Data Protection

Cybersecurity Myths Executives Cling To

Dave Bourgeois & Patrick Leonard

One of the biggest obstacles in cybersecurity is company executives who think they do not need to worry about cyber-attacks. The range of excuses why cybersecurity isn’t on executives’ radars are wide and we’ll debunk them in a bit.

Keep in mind, if you don’t do anything to prevent or mitigate a cyber-attack, it will probably be too late to do anything once it starts. Whether you’re a Fortune 500 enterprise or a small three-person company, 94% of all companies do not survive more than two years following a major data loss regardless if it is a cyber-attack, theft, or disaster. [Gartner]

Prevention is the best way to protect your company’s future and it is a lot cheaper too.

Read More
Topics: Data Protection

Do I Need Cyber Insurance?

David Bourgeois

It may surprise you that your general commercial property and casualty insurance doesn’t cover cyber-attacks. You may not know such a thing as “cyber insurance” even exists or why a business would need cyber insurance.

Cyber insurance financially helps policy holders to mitigate the cost of recovering from a cyber-related security breach. In my opinion, all companies need cyber insurance, whcih is also known as cyber risk insurance or cyber liablity insurance coverage (CLIC). This need is especially prudent for companies with valuable data, such as Protected Health Information (PHI), financial data and stored credit cards, and proprietary information. 

Read More
Topics: Data Protection

About My IT's Blog

We believe an educated client is the best client, therefore, we share our knowledge with executives and business owners looking for a fair, knowledgeable IT firm that fits well with their company and objectives.

My IT helps companies to protect their data, become more efficient and productive, and to boost high-growth using technology. In our blog, we discuss these topics and our extensive expertise working with medical practices, construction industry companies, and auto dealerships.

New Call-to-action

Share This Page

    

Subscribe to Email Updates

Real Time Web Analytics