Cyber Insurance

Security breach impact significant revenue loss for companies. Statistics displayed 29% of companies that face a data breach end up losing revenue. Although there are steps businesses can take to mitigate the risks such as cyber security awareness training, security assessments, investing on a quality firewall, etc.

Why Backing-Up your Data is Important to your Business

Companies (and individuals) who don’t back-up their data regularly put their business at risk. Imagine being called early in the morning just to be told that your entire network is locked up in a ransomware attack and you must pay a hefty ransom because you kept thinking that it would never happen to you, or if one of your employees deletes an important file (whether maliciously or not) or in the worst of cases, hardware failure.

Tips On Using Microsoft Teams

Microsoft Teams is a great tool for your team to use to communicate with each other. Teams is a chat platform that includes many other features such as document sharing, holding online meetings, face to face conversation on video, screen sharing for educational and training purpose, and many more useful features for business communications.

Reasons Why Encryption is Needed When Transmitting Data


Reasons Why Encryption is Needed When Transmitting Data

Since we started writing secrets down, we have always looked for ways to hide those secrets from prying eyes. One way of doing that was using cryptography to scramble the writing so only the person holding the key would be able to decipher what was written.

Cyber-Security Tips When Working Remotely

The world is slowing down during this COVID-19 pandemic. Wall Street is being hit hard. People are no longer going out. We’re told to quarantine or self-isolate and not engage in groups.

You can bet there’s one group that’s not slowing down at all.

Strategies to Use to Protect Yourself from Phishing Scams

Now that  many companies are instituting work from home, this plan opens the door for hackers implementing phishing email attacks. Here are some strategies to use to protect yourself from phishing scams:

You will most likely have vendors reaching out to you asking to get paid via ACH. You need to verify these via phone call and NOT RELY ON EMAIL ONLY.
Any request for changing banking info, payroll info (new bank accounts etc), requests for copies of W2 forms/1099 should also be verified via the phone.

Going Phishing?

Going Phishing?

Here are The Most Common Email Subject Lines to Be Wary Of

Typically, subject lines that seem to trigger attention from an employee and/or require a quick response are associated with completing a task, are personally significant to them or pose some sort of security threat the employee feels he/she should be on the lookout for.