Cyber Safety for Employees – Equifax Security Breach

How to protect yourself if your data has been compromised The Equifax breach has many wondering how this could happen. Hackers exploited a known vulnerability in open source software used by the company.  The industry group claims the patch was made available on March 7, 2017 the same day the vulnerability was found.  Questions on why Equifax didn't move quickly to apply the patch will certainly plague the company as the 143 million victims search for answers. Details on a second hack have people shaking their heads in disbelief that this could happen to the behemoth credit reporting agency. Use the links below to find out if your data was compromised and some of the things you can do to protect yourself. Was my data exposed? Here is the link for the FTC Consumer Information page on how to find out if you are affected and what to do. Monitor or Freeze your … [Read more...]

Cyber Security for Employees

Start the year with a conversation on cyber security for employees.  Train your employees on the technology tools you employ and be sure they understand how the tools will protect and notify them of threats. Educate your employees on the latest threats and teach them how to be vigilant in the fight against cyber criminals. It is also important to have a clear reporting procedure so if an employee sees something suspicious, they have a way to report it quickly.  Below is a list of items to start the conversation on cyber security for employees. You can use as an employee checklist to be sure they understand the types of cyber threats that are most common. Cyber Security Awareness ◊  Look out for social engineering. Social engineering can begin with a phone call asking for information or telling you that your computer has been hacked. The hacker is looking to gain access to your … [Read more...]

Copiers Are A Hidden Treasure For Identity Thieves

Guest blog from Cha Holmes, Co-Founder and Managing Partner for EDGE Business Systems. Have you ever thought about whose hands the information you copy and/or scan can land? Think of all the different types of documents that are copied/scanned (tax returns, medical records, financial information, etc.) and the personal information within these documents. The reason is that today’s digital copy machines contain hand drives, similar to computers, which are capable of storing a large volume of digital information. Nearly all commercial copy machines manufactured since 2002 contain a hard drive that can store every copy/scan made, item printed or fax scanned. While the information might be encrypted, it’s not usually a challenge for hackers to access details, including Social Security and telephone numbers, bank accounts and credit-card numbers, according to digital experts. … [Read more...]

Microsoft Office 365 Trust Center

Concerned about data security, availability and ownership in the Cloud? If you are asking, then you are a savvy Cloud user.  You deserve to have your questions answered to your satisfaction in simple, easy-to-understand terms.  Below is a summary from the Office 365 Trust Center.  If any item needs clarification, let us know and we will personally get you an answer!   In simple terms, with Office 365, it's your data. You own it. You control it. And it is yours to take with you if you decide to leave the service. The core tenets of Microsoft's approach to earning and maintaining your trust are:  Built-in security Service-level security through defense-in-depth Customer controls within the service Security hardening and operational best practices Privacy by design Your data is not used for advertising You have extensive privacy controls You can take your … [Read more...]

Ransomware Threat Increases

The CryptoLocker virus is a ransomware infection that locks files on your computer demanding a payment to unlock.  Over 250,000 computers have been infected since September 2013.  Now a new threat, PowerLocker has emerged. PowerLocker, like CryptoLocker,  uses strong encryption that cannot be cracked to force you to pay to recover your files. It has been reported that the developers of PowerLocker intend to sell the program to other hackers greatly increasing the threat profile. Most CryptoLocker ransomware infections are from email attachments on fake emails.  There are so many fake emails that at first glance look real.  Tracking information emails pretending to be from FedEx or UPS or refunds from Walmart or gift cars from Amazon or a notice from your bank, be sure not to open an attachment unless you are certain it is real.  With the sale of the malicious program, every spammer … [Read more...]