You need a way to monitor the success or failure of your backup system. It’s not enough to have backups that run every day. You need to have SUCCESSFUL backups. Backups that are failing do no good!
So it’s important to keep tabs on your backup system and ensure that the backup jobs are working.
If you check it every day, then you’ll catch problems right away and be able to fix them quickly.
If you aren’t checking on the backups every day, they could be failing Continue reading “Backup Log”
Here is a data loss prevention questionnaire that I created to help you identify your most critical data and clearly document the parameters of your backup plan so that you can compare them to your business requirements.
Using the questionnaire will enable you to confirm that your backup solution is complete, meets your business’ requirements, and clearly communicate between IT and management the parameters of your backup.
The questionnaire will also help you identify gaps in your backup solution so that you can address them. Continue reading “Data loss prevention questionnaire”
What is phishing?
Phishing is when someone tries to trick you into divulging sensitive information like passwords, bank accounts, etc. Phishing attacks are often conducted via email where the email is made to appear as though it’s coming from someone you trust.
Examples of phishing
One example of phishing would be if a scammer sends you an email that’s Continue reading “Phishing: Avoid Getting Caught By The Scam”
Lately there has been a growing concern of botnets fueled by an increasing number of botnet-related articles in the news. The concern is valid as all signs point to botnets growing in number, size, and sophistication.
The botnet threat isn’t likely to go away anytime soon and it’s probably going to get worse before it gets better.
Here’s what you should know about botnets.
Continue reading “What Is A Botnet And Why You Should Care”
Security is the number two priority for small business IT.
Why is security the second most important thing for small business IT?
Because without proper security, your network and your data are at risk.
And the scariest thing about not having good security is that you might not even know that your network and data have been compromised. Hackers could already be inside your network, roaming through your data, using your property to hide out and launch attacks at other networks.
Doesn’t seem possible? Well, Madison Square Garden was hacked and credit card data was being captured and sent to thieves for almost a year before it was detected.
What if you found out that someone you didn’t know had broken into your house a year ago and was using your house, laying in your bed, wearing your clothes, eating your food, and going through your mail without you knowing it?
Continue reading “Security Is Small Business IT Priority #2”
Hackers compromised five different locations of the Madison Square Garden Company: Madison Square Garden itself, The Theater at MSG, Radio City Music Hall, and Beacon Theater all in New York plus the Chicago Theater in Illinois.
Continue reading “Security Breach For 1 Year At Madison Square Garden”
Data loss prevention is the number one priority for small business IT.
What is “data loss prevention” and why is it so important?
Data loss prevention is the tools, technologies, and processes that you use to make sure that your business never loses any data it doesn’t want to.
Data loss does not just refer to the data going missing, it also includes things like: users deleting files they shouldn’t; data and files getting corrupted; writing bad data over your good data; hackers messing with your data; viruses, malware, and crypto-ware infecting your data; hard drives crashing; servers crashing; and any other situation that would result in the loss, destruction, corruption, degradation, or tampering of your data.
The reason it’s so important is …
Continue reading “Data Loss Prevention – IT Priority Number 1”
I believe small businesses should have a plan for their IT. There will be differences between businesses for obvious reasons, but in large part there are some common key elements that make up a good IT plan for all small businesses.
Here are the basics that a small business should have as part of their IT:
Continue reading “Small Business IT Plan – The Basics”
A major Internet attack today (2016-10-21) affected popular Internet sites like Amazon, Netflix, Twitter, and more.
The attack was a “distributed denial of service” (DDoS) attack, where a large number of devices, typically a botnet, are used to flood the targets with Internet traffic. The flood of traffic overwhelms the capacity of the targets and disrupts them to the point they are unable to respond to the real data.
It’s believed to have been trigged by a program called Mirai which makes it easy to infect online devices and use them to create a botnet that can launch DDoS attacks like this one.
What’s really scary is that it doesn’t even take a skilled hacker to use Mirai and tools like it to infect large numbers of devices, create botnets, and then use them in attacks.
Continue reading “Recent Internet Attacks Affect Amazon, Netflix, Twitter, And More”
Digital Trends has an article about a recent security breach that resulted in the loss of 58 million personal records.
As if that’s not bad enough, the article claims nearly 3,000 reported security breaches so far in 2016 of 2.2 billion records.
Those numbers are astronomical!
Continue reading “Security Breaches Resulting In Loss of 2.2 Billion Personal Information Records So Far In 2016”