Most of us have unknowingly amassed a massive footprint of personal information that encompasses all aspects of our lives and choose to keep it stored in an extremely vulnerable centralized repository; our personal email address.
Whether its work or personal, passwords are an integral part of our routines at every level of access, and with the increasing complexity of illicit attempts to gain entry into our lives of password laden data it forces us to adapt and further enforce our own internal password policies & procedures.
In doing so it also creates additional points of user vulnerability if we continue to rely on the password storage recall techniques of days past.
Over the last 2-3 years we have seen an exponential increase in cyber security attacks among our clients. Virtually all businesses in all industries are at risk – it’s not just big business anymore! We have developed a simple program for all our clients to assess their current risk and reduce the risk of falling victim to an attack, while being cognizant of the costs.
Over the last 2-3 years we have seen an exponential increase in cyber security attacks among our clients. Virtually all businesses in all industries are at risk – it’s not just big business anymore! We have developed a simple program for all our clients to assess their current risk and reduce the risk of falling victim to an attack, while being cognizant of the costs. Join us to find out how you can improve your security position without breaking the bank.
Here are three facts all business owners and employees must know:
1. U.S. businesses are the top targets of cyber attacks worldwide;
2. The frequency and ferocity of cyber attacks will continue to rise in 2019;
3. Employees are the weakest link in most businesses’ IT security programs.
To help prevent such an attack on your company, EXP is hosted a Security Awareness Training for business owners and employees.
Though writing and enforcing policies and procedures is probably nobody’s favorite area of IT operations, it’s still a vital part of your business. While creating and following set policies is mandatory for government contractors and HIPAA covered entities, EXP takes it a step further. We recommend all companies and organizations maintain and enforce a basic package of policies and procedures that includes the following points…
There was a time when strong passwords were good enough to protect your information. More recent wisdom recommends we use passphrases, which are longer and much harder to crack.
Today, as phishing attempts get more sophisticated, you must adapt accordingly because passwords alone don’t cut it […]
“Imagine a typical Seattle weather day (excluding July and August maybe). You’re heading out for a mixed day of fun and errands that may include visiting the local farmers market, taking the dog for a walk, making a trip to a taco truck, and maybe a hike around Discovery Park. You’ll do some walking, some driving and move between indoors and outdoors. How do you dress for this multi-faceted excursion? Layers. The answer is always layers.”
“The typical computer network usually has a closet full of skeletons. Now, there could be more than one closet in any organization, but here I speak of the IT closet, and its name is convenience. It is filled with seemingly harmless security compromises designed to make work more enjoyable, and in the short term, more productive. Filling this closet usually occurs slowly over time, not overnight, and the effects can have serious consequences.”
At EXP, we strongly believe in the web of protection that must exist to properly guard institutions and their data from these threats. This web is comprised of several things. Many of these are technological tools that keep threats from ever entering your environment, let alone being executed within it. Unfortunately, all the gates, checkpoints and filters cannot prevent human error\action – frequently the last stop on the cyberthreat train. Humans must be informed users of technology for our web of protection to remain whole.