Data Backup: Easy as 3-2-1

A good and complete data backup of your computer system is your first line of defense against data loss.  And a little planning will protect you against a variety of mishaps. Whether your data is lost because of a disaster or held for ransom from a hacker, your data backup will save the day.  You can do the backup yourself or hire a managed services company to schedule and maintain,  Either way, it is important to understand your options. An easy-to-understand strategy is the 3-2-1 backup plan. It has been used for years in the computer industry as a formula to protect data. This type of backup plan is simple but adequately safeguards data so that if the worst happens, the system can be rebuilt and the data restored – quickly and reliably. 3: Keep three copies of critical data. Be sure to have three unique copies of any data that you want to protect stored in three different … [Read more...]

Cyber Security for Employees – Phishing

Phishing . . . any number of scams that want to hook you and steal from you Phishing can be an email, IM, phone call or website that tricks you into doing something that gives up your personal information or grants access to your computer. As you can imagine, the name comes from fishing. You bait a hook and see what you get. It is not surprising that so many people are taken in by phishing scams. The scams are quite plentiful and the bait looks like the real thing. Phishing is the number one way of delivering ransomware. And with Ransomware as a Service (RaaS) on the rise, you must protect yourself. In this article, we look at the most common phishing attempts, how to spot them and avoid being a victim. Remember, just like learning anything, it takes practice to spot phishing and other online scams. Keep your eyes open and be vigilant. Phishing emails with malware They are so cleaver. … [Read more...]

Why does China want your gmail account?

Google is certain that the latest hacking attempt comes from Jinan, China as a phishing scam to obtain gmail passwords. This type of attack happens all the time, but since senior level US government officials, military personnel and political activists were targeted the intent seems much more sinister. The attacks were common phishing schemes that are not very sophisticated opening speculation that this was testing the water and that the information may be used for broader attacks. If someone has your username and password, they can hijack your account.  Not only will they have access to your email, but they can change account settings, forward email and send email as you.  If you are unaware that your account has been compromised, the hacker can play havoc with your information and identity. Certainly, you have heard these warnings: create a strong password, don’t divulge username … [Read more...]