cyber security

Take Control of Password Management

Whether its work or personal, passwords are an integral part of our routines at every level of access, and with the increasing complexity of illicit attempts to gain entry into our lives of password laden data it forces us to adapt and further enforce our own internal password policies & procedures.

In doing so it also creates additional points of user vulnerability if we continue to rely on the password storage recall techniques of days past.

Read More

5 Cybersecurity Measures You Must Follow

There is a lot more to maintaining a good cybersecurity program than the five important items mentioned here, especially if you are in a high-compliance line of work such as healthcare or government contracting. But it’s an excellent place for small and medium organizations to start.

Read More

EXP IT Security Program - Reducing the risk without breaking the bank - FREE Recorded Web Seminar

Over the last 2-3 years we have seen an exponential increase in cyber security attacks among our clients. Virtually all businesses in all industries are at risk – it’s not just big business anymore! We have developed a simple program for all our clients to assess their current risk and reduce the risk of falling victim to an attack, while being cognizant of the costs.

Read More

EXP Cyber Security Program - Reducing the risk without breaking the bank

Over the last 2-3 years we have seen an exponential increase in cyber security attacks among our clients. Virtually all businesses in all industries are at risk – it’s not just big business anymore!  We have developed a simple program for all our clients to assess their current risk and reduce the risk of falling victim to an attack, while being cognizant of the costs.  Join us to find out how you can improve your security position without breaking the bank. 

Read More

IT Security Awareness Training — FREE Recorded Web Seminar

Here are three facts all business owners and employees must know:

1. U.S. businesses are the top targets of cyber attacks worldwide;
2. The frequency and ferocity of cyber attacks will continue to rise in 2019;
3. Employees are the weakest link in most businesses’ IT security programs.

To help prevent such an attack on your company, EXP is hosted a Security Awareness Training for business owners and employees.

Read More

Windows 7 End of Support is Coming... Are You Ready?

January 2020 may seem far off, but when it comes to the security of your operating system, it’s closer than you think. Beginning on January 14, 2020, the following Microsoft products will no longer be supported:

Windows 7
Windows Server 2008 & 2008 R2
Exchange 2010
Small Business Server 2011

Read More

Creating and Enforcing IT Security Policies

Though writing and enforcing policies and procedures is probably nobody’s favorite area of IT operations, it’s still a vital part of your business. While creating and following set policies is mandatory for government contractors and HIPAA covered entities, EXP takes it a step further. We recommend all companies and organizations maintain and enforce a basic package of policies and procedures that includes the following points...

Read More

Think Before You Click: Employees Need to be at the Frontline in the Battle Against Phishing

At EXP, we strongly believe in the web of protection that must exist to properly guard institutions and their data from these threats. This web is comprised of several things. Many of these are technological tools that keep threats from ever entering your environment, let alone being executed within it. Unfortunately, all the gates, checkpoints and filters cannot prevent human error\action – frequently the last stop on the cyberthreat train. Humans must be informed users of technology for our web of protection to remain whole.

Read More

Stay Alert & Foil Phishing Attempts

We regularly see cases of successful phishing attacks. Most of them involve people being conned into sharing valuable personal information with unauthorized parties. This is usually done over email but sometimes involves a phone call.

A frequent scam goes like this. You receive an email from someone claiming to work at an organization you trust or regularly interact with such as your bank or a retailer you often shop with. They seem legitimate because they have likely gathered some accurate information about you from social media, your company website, press releases, or other public means. Since they get a few details right, you may be inclined to believe them. But you must dig deeper to determine if the request is legitimate.

You may be asked for personal information that could be used to access funds — credit card numbers, bank account information, passwords, etc. — or even asked to wire money. All this is done, of course, under false pretenses. And it could cost your business a heap of money and hassle.

Read More