Malicious email: How to identify phishing scams, spam and malware

Malicious email: How to identify phishing scams, spam and malware

How much of your email is real business email? If you’re like most business professionals, you spend a lot of time keeping unwanted emails out of your inbox, while trying not to miss any messages from clients, colleagues and prospects. You may use various tools like: Captcha features on website contact forms Sanebox, Unroll.me and…

How to Recover from a Data Security Breach, Data Loss or Malware Attacks

How to Recover from a Data Security Breach, Data Loss or Malware Attacks

You KNOW you could have / should have done more to protect your business data… but now it’s too late and your computers have been compromised. What should you do in the event of a data security breach? 1. CALL IT DATA SECURITY PROFESSIONALS ASAP! Just like a fire or medical emergency, time is of…

Disaster Recovery Planning – IT Lessons from Hurricane Season

Disaster Recovery Planning – IT Lessons from Hurricane Season

Hurricanes. Floods. Fires. Tornados. Natural disasters remind us that we can’t control everything. What we can control is how we prepare in advance and how we respond afterward. Disaster recovery planning is critical! Imagine that a fire burnt your business to the ground overnight. How quickly could you get back up and running? I worry…

Ghosts in the machine

Ghosts in the machine

IT Policies and Procedures Do you have a tight onboarding / offboarding checklist you use when hiring a new employee or consultant? If not, it’s likely you have “ghosts in the machine” – people who can still access your data, even though they no longer have an affiliation with your company.  Fortunately, most of the…