Let’s face it—policies matter.
We all need—especially in organizations like yours—a good way to track our policies back to compliance standards and enforce them through various procedures
The problem we’ve seen is that many organizations are often managing these policies and procedures in Word documents, Sharepoint files, or even in Excel spreadsheets, making the task of enforcing compliance—ensuring that procedures and policies match up with changes in compliance—a real heck of a task.
How are policies and procedures getting misplaced, outdated, unseen, or even lost?
continue reading
“Talking about this service issue reminds me why I love working with your company”.
That was a comment that come up in a conversation I had with one of my clients last week.
What we were discussing was an issue that had arisen during the week, leaving some concern that we might not be doing everything the way it should be done.
Instead of simply giving lip service to our clients, we listen to problems they have with our service. In fact, we treat service issues very seriously.
continue reading
Microsoft announced that it will terminate support for Windows 7 on January 14, 2020. While January 2020 seems a faraway date, the clock is ticking—and security experts warn that 11 months is not a very long time to plan and implement a strategy to transition from the Windows 7 operating system.
With that announcement came a LOT of confusion about what exactly that means. Will you be able to run Windows 7 going forward? And what exactly does it mean that support is terminated?
Generally, Microsoft promises 10 years of support for business and enterprise software. This support period is split up into two periods: Mainstream Support and Extended Support.
continue reading
They might be giving away more than they’d bargained to.
Hackers have actually come up with quite a devious way to get information from your users. In effect, by asking them to verify their identity through logging into their Facebook or other social media account—they are on their way to steal your user’s identity.
What are these scams called?
It’s actually another kind of phishing attack.
continue reading
Recently, there has been a lot of chatter from people concerned that their devices connecting to the internet may be compromised or experiencing issues.
For many of these devices, you might not need to be concerned, as long as you are making a habit of following a few ‘good housekeeping’ best practices when it comes to cybersecurity.
I want to take a few minutes to remind you of a few easy ways you can make sure your devices—both in the office and at home—are secure.
Even if your device hasn’t been hacked, your accounts may be vulnerable because your email addresses and passwords have been compromised, published on the Dark Web.
continue reading
I was reading an article on cybersecurity the other day that had argued that cybercrime is inevitable.
Whatever you did, someone is bound to find a way in. The article briefly mentioned an attack that compromised nearly 773 MILLION email accounts and credentials and was underscoring a theme that has grown far too common among cybersecurity professionals: there is no hope.
I want to be clear here: I am NOT one of those professionals. There is certainly more than just hope when it comes to protecting your business or your personal information.
While this article suggested we not digitize everything and revert back to paper, what it misses is that most people do not follow through on very simple techniques to keep data secure.
continue reading