SMB

Can SMBs Do Something to Prevent Ransomware? (Yes!) - Part 2

Last year Locky, NotPetya and WannaCry ransomware savaged Internet users, with billions of dollars lost, data destroyed, worldwide shipping disrupted, and reputations damaged. Even though they are the most hacked businesses on the Internet, many SMBs do not have proper cybersecurity protections in place. In part 2 of this two-part series, Dave Moore, founder of Internet Safety Group, walks the reader through a well-crafted response plan and reviews of the top backup programs.

Can SMBs Do Something to Prevent Ransomware? (Yes!) - Part 1

Last year Locky, NotPetya and WannaCry ransomware savaged Internet users, with billions of dollars lost, data destroyed, worldwide shipping disrupted, and reputations damaged. Even though they are the most hacked businesses on the Internet, many SMBs do not have proper cybersecurity protections in place. In part 1 of this two-part series, Dave Moore, founder of Internet Safety Group, explains why and how SMBs need to make Internet safety training a top priority.

Cybersecurity For SMBs: Why Identifying & Protecting Critical Information Assets Should Be A Foundational Element Of Your Security Program

The digital world has become a scary place, one in which few small- and medium-sized businesses (SMBs) feel that they are adequately protected. Jeremy Wittkop, CTO of InteliSecure, outlines the steps necessary to achieve effective information security through identification and prioritization of key assets most important to a business.

3 Signs Your Website Security Strategy Is in Need of a Refresh

The threat of cybercrime continues to grow, and small and medium-sized businesses (SMBs) should be especially concerned as they lack the IT budget and resources that larger enterprises have and are thus more likely to struggle after suffering a breach. For those guilty of letting their website security strategies sit on the back burner, SiteLock president Neill Feather suggests that it may be time to consider a strategy refresh.

We Are All A Cyber Fraud Target. 5 Tips To Help You To Be Cyber Secure.

As technology works to make our lives easier, the downside is there are more ways than ever to become the victim of fraud. Fraudulent activity can destroy your identity, reputation, finances and much more. The good news is there are ways to protect yourself and stay safe.

Nearly Half of SMBs Plan to Invest in Cybersecurity in 2018

As part of Kabbage’s ongoing effort to help small businesses to be successful, Kabbage recently surveyed more than 800 customers and nearly half (47 percent) plan to invest in cybersecurity products and services in 2018.

GDPR Will Have A Big Impact On Small And Medium Business - Part 3

Welcome to the last of our three-part GDPR series. In this post we’ll dive deeper into a few more key concepts, like individual rights, data controllers vs. data processors (and how you can determine which one you are), and the new 72-hour rule for data breach reporting.

It Looks Like Your SMB Needs A New List Of Cybersecurity Resolutions

We’re only a few weeks into 2018, but it’s already feeling a lot like last year for security experts. Here's how to determine whether your SMB needs a cybersecurity overhaul in 2018, and how to actually keep your security resolutions throughout the year.

GDPR Will Have A Big Impact On Small And Medium Business - Part 2

In Part One of our three-part series, we started with a basic overview of who GDPR applies to and the definition of personal data under GDPR. Here in Part Two we will discuss key elements such as consent and online data technologies, privacy notices and cross border transfers. Part Three will dive into understanding individual rights and the obligations of a data controller and data processor.

GDPR Will Have A Big Impact On Small And Medium Business - Part 1

GDPR is a complex regulation comprised of 99 articles. In this 3 part series, we’ll break down the components of GDPR starting with an overview of the regulation and why you need to start preparing now. Part 2 will discuss some of the key elements including obtaining valid consent, online data technologies, privacy notices and cross border transfer. Part 3 will dive deeper into understanding the obligations of a Data Controller and Data Processors, individual rights, and the 72 hour data breach notification requirement.

If You Thought 2017 Was Tough, Say Hello To 2018

2017 brought some of the most damaging cyber-attacks and volume driven data breaches the world has ever seen. Detailed profiles have been built on nearly every individual in the United States posing a threat to each consumer and organization. A wave of cyber crime is coming our way in 2018 like never seen before. How will you respond?

Your Firewall Won’t Save You From The Next DDoS Attack

“I suppose it is tempting, if the only tool you have is a hammer, to treat everything as if it were a nail.” - Abraham Maslow, The Psychology of Science, 1966. But using firewalls to protect against DDoS attacks has its limitations.

Seriously?! Can You Not Do That? Chapter III - External Internet Access

Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.

Data Breaches Happen to SMBs Too. Often Because of Human Error

Many SMB employees out there put themselves – and their sensitive data – in harm’s way because they are unaware of the risks and the proper security measures to take. In fact, in many data breach cases, human error is often the culprit.

5 Best Practices to Protect Your Small Business from Cyber Attacks

Most small businesses think that they can’t or won’t be the victims of cyber attack — that fraudsters and hackers are only interested in going after large corporations. Think again — and consider these 5 best practices when you do.