Should Your Small Business Invest in Cybersecurity Insurance?

We’ve discussed the use of strong passwords. We’ve covered the many different cyberattacks that target businesses. Armed with this knowledge, it makes sense to seek out additional ways to prevent financial loss from the damage cyberattacks can cause.   Your small business isn’t safe from cybersecurity hacks. In fact, hackers often target smaller companies because [...]

By |2020-02-05T13:34:31-06:00April 17th, 2019|

Stop Social Engineering from Attacking Your Business

Social engineering is the process of manipulating human emotions to generate a reflex response. This reflex response usually causes someone to overlook obvious clues that they’re being scammed, which is how companies end up with data be held for ransom, viruses attacking their systems, or emails being spammed.   You’ve likely heard of at least [...]

By |2020-02-05T13:34:39-06:00March 27th, 2019|

Arm Your Employees Against Phishing

If you think the biggest threat to your cybersecurity is targeted at your anti-virus, spam filters, and firewalls, you’re wrong. Your biggest threat is all around you. Down the hall. In the office next door. Even at the water cooler. Your biggest threat is your people.   While hackers do still try to attack businesses [...]

By |2020-02-05T13:34:55-06:00February 26th, 2019|

Small Business Cybersecurity Recovery Plan

We’ve talked about creating a Technology Disaster Plan. We’ve provided a guide on how to recover from a physical technology disaster. Now, we’re going to address the importance of having a cybersecurity recovery plan in place.   Cybersecurity risks are harder to pin down than other types of business disasters. To quote Mike Osborne, founding [...]

By |2020-02-05T13:35:04-06:00February 19th, 2019|

Small Businesses and the Bring-Your-Own-Device Dilemma

It’s time to turn your attention to mobile devices. With the rise of bring your own device (BYOD), many companies expose themselves to risks they may not be aware exist.   What is Bring Your Own Device (BYOD)? Employees utilize personal technology (like phones or tablets) to execute work-related functions. Sometimes, this means accessing confidential, [...]

By |2020-02-05T13:35:19-06:00January 29th, 2019|

Prevent Hacking: How to Verify Email Sender Information

Why is it important to verify who sent the email before you open or click on an email?   Hackers prey upon thoughtless human error. They count on their recipients to react before they think. To stay ahead, it’s important to arm yourself with knowledge and keep your common sense at the forefront when using [...]

By |2020-02-05T13:35:42-06:00January 7th, 2019|

How To Create a Business Tech Disaster Plan

"It won’t happen to my business.” And then it does.   Whether natural, accidental, or criminal, disaster strikes when you least expect. Is your business technology prepared for the unexpected?   It’s time to make a plan. We’ve laid out the basic steps to prepare your business, but we always recommend utilizing a professional when [...]

By |2020-02-05T13:36:32-06:00October 17th, 2018|
Go to Top