NEWS FROM THE EDGE

Tech Tips and Advice from the Experts at Dynamic Edge

With smarter firewalls and spam filters, much of the malicious traffic targeting your email box can be identified and removed from user’s inboxes (Note: your email is probably not scotch free of phishing scams. You still need to be diligent about identifying scams and skeptical to give out personal or valuable information through email).
continue reading

KeePass

Did you know that you should never store your password in an Excel file or a Word document? OR A POST-IT NOTE! Did you know that you need to have a different password for all your accounts?

Do the above facts leave you looking for a better way to keep track of all the login names and passwords you use to access information on a regular basis? At Dynamic Edge, we’ve been using password databases for years, which makes our lives simpler because all the passwords we need are stored in one location.

After serious searching, we’re happy to say that we’ve found a free, open source password manager that you can use to manage your passwords in a secure way — just like us!
continue reading

Printer SecurityOne of the biggest threats to breaches of sensitive data time and time again was rooted in vulnerabilities from printers and copy machines. The problem with these devices is that they are monitored by printing companies that do not have the expertise or training in data and cybersecurity. And another problem is that many managed services providers or IT Support companies fail to assess and secure the entirety of your network—including printers and copiers supported by third party vendors.

 

Your reality is that all printers need to be routinely checked for security issues

In fact, all copiers, printers and fax machines are required to be secured and maintained according to security standards—especially for businesses with security compliance pressures, such as HIPAA, PCI or NCUA.
continue reading

it-security-relationshipsHands down, relationship-building is a key to success in any organization. And that includes IT Support! If our team isn’t engaging with users, making them feel comfortable with us, don’t you think their experience with technology at work—specifically in ways they can help keep your business’ network secure—suffer?

If they are in fact concerned about your security, most IT Departments and Managed Services Providers stress out over the nuts and bolts—hardware and software—on your networks. Some may send out impersonal emails warning users of the latest attack (if you’re luck!), but without getting to know users and establishing a healthy working relationship with them, your business may be turning your biggest assets (your team members) into your biggest liabilities (phishing victims, password violators, sensitive data leakers) without even realizing it!

First, what do I mean by a strong relationship?
continue reading

cybersecurity-firewallWith all the cyberattacks lately, how can you expect one IT guy to catch up? Cybersecurity threats are growing by the day—a 450 BILLION dollar industry has made it easy to recruit. And many budding criminals are getting on the job training on the most effective attacks.

In fact, there’s little more than ordering a kit nowadays—that include all the steps on how to initiate a successful cyber campaign. That means, criminals don’t have to be the computer wiz to get some really lucrative attacks (attacks that are hitting businesses like yours!).
continue reading

Gambling Mouse Trap

Like it or not, if any computer on your network is connected to the internet, your ENTIRE network is vulnerable to cyberattacks.

With the hidden costs of a cyberattack on the rise and with more and more aspiring criminals salivating over the potential to hack into your business network and steal or ransom your data, your organization’s network needs to be more careful (and secure) than ever before. And a part of being secure is having someone on your IT support team that really understands your businesses current security risks and the steps to take to alleviate any time bombs that might trigger a disastrous event down the line. What your IT support critically needs now more than ever before is a cybersecurity expert trained, certified and up-to-speed on latest security vulnerabilities and exploits criminals are using to get into business networks.
continue reading