Some of the most well-known companies in the world, including Sony Pictures, Home Depot, Adobe, and eBay, have been victims of cyberattacks. While major corporations like these are high-profile targets for hackers, small- and medium-sized businesses are not exempt from data breaches. And because it may be difficult or impossible to undo any damage caused Learn More “Ways to safeguard your company’s data”
When it comes to business IT security, many small- and medium-sized businesses like yours often struggle to protect their systems from cyberattacks. One primary step is to be aware of online threats. Here are five common ways your systems can be breached. 1. You are tricked into installing malicious software There are countless ways you Learn More “5 Ways systems can be breached”
Today’s companies need technology to function. Without it, businesses cannot compete and succeed. But with technology comes the ever-constant threat of hackers and cybercriminals. That’s why small- and mid-sized businesses need to protect themselves with robust cybersecurity solutions managed by IT professionals. The numbers According to the Ponemon Institute’s 2019 State of Cybersecurity in Small Learn More “Why managed IT services is best for cybersecurity”
If you want to cut costs on IT hardware, don’t settle for cheap but old or low-quality machines. They’ll likely offer subpar performance, which will hurt your team’s productivity. What’s worse, they’ll likely break down often, too, which means the money you initially saved will go to repairs and upgrades. Instead of buying low-end machines, Learn More “Cutting IT hardware costs with thin and zero clients”
Did you know that in some industries the biggest cybersecurity threats come from inside a breached organization? Sometimes it’s motivated by financial gain and sometimes it’s plain-old ignorance. So how can you protect your organization from insider threats? #1 Educate You must teach your team to recognize personally identifiable information (PII) and understand the financial Learn More “Mitigating cybersecurity insider threats”
The security of your systems and technology is a constant battle, and one you will likely never completely win. There are significant steps you can take to secure your systems, but having knowledge about your systems is one of the most effective tools. If you know how your systems can be breached, you can ensure Learn More “5 Security issues to look out for”
You can’t afford to lose business data. It takes away the trust of your clients, leading to loss of revenue. Cybercriminals are here to stay, so it’s more important than ever to utilize tight security measures to keep your business data safe. Still, some hackers may have advanced cracking skills, or are really determined to Learn More “Tips for safeguarding business data”
It’s no secret that cutting costs is one way to increase profit. When it comes to tech, most businesses do this by bringing their operations to the cloud, hiring pay-as-you-go service providers, and uninstalling unnecessary software. Another way to reduce costs is by swapping bulky desktops for thin or zero clients. What are thin and Learn More “How thin and zero clients can reduce IT costs”
Despite efforts to protect your data, some breaches are beyond your control. When an online company with your personal details gets hacked, you have no choice but to manage your risks on your own. These practical tips can help you reduce risks of identity theft and other threats.
Determine what was breached
Whether its names, addresses, email addresses, or social security numbers, it’s critical to know exactly what type of information was stolen before determining what steps to take. For example, if your email address were compromised, you’d take every precaution to strengthen your email security, which includes updating all your login credentials.
Change affected passwords immediately
Speaking of passwords, change yours immediately after any breach, even for seemingly safe accounts. Create a strong password comprised of alphanumeric and special characters, and make sure you never reuse passwords from your other accounts.
Once you’ve changed all your passwords, use a password manager to help you keep track of all your online account credentials.
If the website that breached your information offers two-factor authentication (2FA), enable it right away. 2FA requires two steps to verify security: usually a password and a verification code sent to a user’s registered mobile number.
Contact financial institutions
In cases where financial information was leaked, call your bank and credit card issuers to change your details, cancel your card, and notify them of a possible fraud risk. That way, banks can prevent fraud and monitor your account for suspicious activity.
Note that there are different rules for fraudulent transactions on debit cards and credit cards. Credit card transactions are a bit easier to dispute because they have longer grace periods. Debit card fraud, on the other hand, is more difficult to dispute, especially if the fraudulent transactions happened after you’ve notified the bank.
Place a fraud alert on your name
Hackers who have your personal information can easily commit identity fraud. To avoid becoming a victim, contact credit reporting bureaus like Equifax, Experian, or Innovis and request that a fraud alert (also called credit alert) be added to your name. This will block any attempt to open a credit account under your name and prevent unauthorized third parties from running a credit report on you.
Putting a credit freeze on your name might result in minor inconveniences, especially if you have an ongoing loan or credit card application. Still, doing so will greatly reduce your risks of getting defrauded.
These steps will ensure you don’t fall victim to identity theft in the event of a large-scale data breach. If you want to take a more proactive approach to protect your sensitive information against breaches, contact our cybersecurity experts today.
Thanks to social media, businesses can stay in close contact with their customers and while also attracting new ones. But what happens when one of these platforms doesn’t guard the information you’ve given it? How does this affect its users?
Last month, news broke that a firm known as Cambridge Analytica collected private data from over 50 million Facebook users. The British company supposedly used this information in 2016 to influence voter behavior during the US presidential election and UK’s Brexit campaign.
How did they harvest the data?
In 2015, a Facebook personality quiz app called “This is Your Digital Life” was created by Cambridge psychology professor Aleksandr Kogan. Around 270,000 Facebook users signed up and gave information about themselves in exchange for humorous results.
What users didn’t know was that Kogan’s firm, Global Science Research, struck a deal with Cambridge Analytica to share the information that was gathered. Aside from collecting information about the Facebook users, the app also mined some data about the users’ friends.
Information collected was based on:
- Data from other platforms that are also owned by Facebook, including Instagram and WhatsApp
- Advertisers and other third-party partners
- Apps and websites which use Facebook services
- Your location
- The devices you use for Facebook access
- Payments handled by Facebook
- Your Facebook connections and networks
- Messages, photos and other content that other users send to you
- The information you disclose to Facebook
- Your activities on Facebook
What happened to the sourced information?
Cambridge Analytica analyzed the collected data to create psychological profiles and invent better political drives to influence whom people would vote for. Although there is still a huge debate about how effective this plans were, there’s no doubt that tens of thousands of users were manipulated into signing away their data without knowing it.
What can I do to keep my information safe?
Remove third-party apps that use your Facebook account. Visit your “Settings” menu and go to “Apps”. You should see the list of all the services that are using information about your Facebook profile. Check on each app, and if you don’t need it or use it anymore, delete it to revoke its access.
If you need more information on how to keep your data secure, feel free to give us a call today!