PERSPECTIVES

Defeating cyberthieves requires a shift from defense to offense

Defeating cyberthieves requires a shift from defense to offense

Security

Unless you’ve been living deep in the Amazon jungle, you know how the world is now more connected than at any time in history. Technical advances, data sharing, and the massive digital transformation of corporations has sped up communication and created seamless connections between millions of people. But as much as we reap the advantages of this new order, we also have to contend with the negative ramifications on cyber security. Because wherever there’s sensitive…  MORE

SHARE THIS

No one could realistically debate the importance of IT services. To literally stay in business and serve their customers, every company needs a reliable network and data security. But the reality is that many can’t afford a full-time, in-house staff that’s up to speed with latest technology. That’s why it’s become common to outsource IT services to a managed service provider (MSP). Part of that working relationship means that the provider assumes a certain level…  MORE

SHARE THIS

Be aware of ransomware

February 14, 2017  |  BY

Ransom isn’t the same as it used to be. In the past there were kidnappings, secret hideouts and negotiations between the good guys and the bad guys. Now we have ransomware, a term that describes how a computer is first infected, then its data encrypted, with the “kidnapper” threatening to destroy the data unless they’re paid a lot of money. Ransomware isn’t a new by any stretch. But according to security provider Carbon Black, ransomware…  MORE

SHARE THIS

When we hear about security breaches on the news, it’s always about a disaster at a big enterprise. Target, Walmart and Home Depot are just some of the major players that have dealt with the damage and public scrutiny that results from cybercrime. Owners of small and medium-sized businesses may sit back and think, “Good thing we won’t have that problem.” Unfortunately, Internet criminals don’t discriminate. Customer data and credit card numbers are equally valuable…  MORE

SHARE THIS

If you’re old enough to remember professional basketball in the 1990s, you surely recall the dominance of Michael Jordan. It got to the point that opposing teams implemented a wishful thinking type of strategy: In order to beat the Bulls, they had to contain Jordan, since stopping him was impossible. Although passes were the only thing that Jordan ever stole, the same strategy applies to how companies have to approach hackers looking to steal credit…  MORE

SHARE THIS

Beyond the day-to-day marketing, business development, operations, and human resources activities, every company must also contend with security threats. It’s simply part of the process of doing business in the digital age, when cyber crime can lead to financial losses, reduced productivity and poor customer confidence. Given this reality, it’s imperative for your business to periodically invest time in reviewing your cyber security protections. Some tips: Clean out the clutter With all the concern about…  MORE

SHARE THIS

It seems like every other month, we hear about a security breach at a large company. And when that large company is a mega-retailer, like Target, there’s huge trouble. Not just for the hundreds of thousands (or millions) of consumer records in the database, but a loss of consumer confidence. What’s a poor retailer to do? Once a reputation gets damaged, it’s tough to win back confidence from customers who have dozens of other shopping…  MORE

SHARE THIS