Cyber Security for Employees

Start the year with a conversation on cyber security for employees.  Train your employees on the technology tools you employ and be sure they understand how the tools will protect and notify them of threats. Educate your employees on the latest threats and teach them how to be vigilant in the fight against cyber criminals. It is also important to have a clear reporting procedure so if an employee sees something suspicious, they have a way to report it quickly.  Below is a list of items to start the conversation on cyber security for employees. You can use as an employee checklist to be sure they understand the types of cyber threats that are most common. Cyber Security Awareness ◊  Look out for social engineering. Social engineering can begin with a phone call asking for information or telling you that your computer has been hacked. The hacker is looking to gain access to your … [Read more...]

Copiers Are A Hidden Treasure For Identity Thieves

Guest blog from Cha Holmes, Co-Founder and Managing Partner for EDGE Business Systems. Have you ever thought about whose hands the information you copy and/or scan can land? Think of all the different types of documents that are copied/scanned (tax returns, medical records, financial information, etc.) and the personal information within these documents. The reason is that today’s digital copy machines contain hand drives, similar to computers, which are capable of storing a large volume of digital information. Nearly all commercial copy machines manufactured since 2002 contain a hard drive that can store every copy/scan made, item printed or fax scanned. While the information might be encrypted, it’s not usually a challenge for hackers to access details, including Social Security and telephone numbers, bank accounts and credit-card numbers, according to digital experts. … [Read more...]

Microsoft Office 365 Trust Center

Concerned about data security, availability and ownership in the Cloud? If you are asking, then you are a savvy Cloud user.  You deserve to have your questions answered to your satisfaction in simple, easy-to-understand terms.  Below is a summary from the Office 365 Trust Center.  If any item needs clarification, let us know and we will personally get you an answer!   In simple terms, with Office 365, it's your data. You own it. You control it. And it is yours to take with you if you decide to leave the service. The core tenets of Microsoft's approach to earning and maintaining your trust are:  Built-in security Service-level security through defense-in-depth Customer controls within the service Security hardening and operational best practices Privacy by design Your data is not used for advertising You have extensive privacy controls You can take your … [Read more...]

Ransomware Threat Increases

The CryptoLocker virus is a ransomware infection that locks files on your computer demanding a payment to unlock.  Over 250,000 computers have been infected since September 2013.  Now a new threat, PowerLocker has emerged. PowerLocker, like CryptoLocker,  uses strong encryption that cannot be cracked to force you to pay to recover your files. It has been reported that the developers of PowerLocker intend to sell the program to other hackers greatly increasing the threat profile. Most CryptoLocker ransomware infections are from email attachments on fake emails.  There are so many fake emails that at first glance look real.  Tracking information emails pretending to be from FedEx or UPS or refunds from Walmart or gift cars from Amazon or a notice from your bank, be sure not to open an attachment unless you are certain it is real.  With the sale of the malicious program, every spammer … [Read more...]

Safe Computing for the Holidays

Taking time off to spend with family and friends is such a treat, but alas for many it is hard to stay away from the computer.  If you are going to do some online shopping, play a new game or check your work email, be sure to practice safe computing.  Your home computer may not have the same protection as work, so before you download that file or visit a new site make sure you are protected. Protecting your computer 1)  Make sure your operating system is updated and all security patches are installed.  If you are using Windows, go to Control Panel Home, then Windows Update. This page will show you if you are up to date or if you need an update.  If you are out of date, follow the instructions and consider turning on automatic updates.  If you have a Mac, the update is similar to Windows so just follow the instructions.  If you have Unix or Linux, you are probably an expert and know … [Read more...]