Malicious email: How to identify phishing scams, spam and malware

Malicious email: How to identify phishing scams, spam and malware

How much of your email is real business email? If you’re like most business professionals, you spend a lot of time keeping unwanted emails out of your inbox, while trying not to miss any messages from clients, colleagues and prospects. You may use various tools like: Captcha features on website contact forms Sanebox, Unroll.me and…

How to Recover from a Data Security Breach, Data Loss or Malware Attacks

How to Recover from a Data Security Breach, Data Loss or Malware Attacks

You KNOW you could have / should have done more to protect your business data… but now it’s too late and your computers have been compromised. What should you do in the event of a data security breach? 1. CALL IT DATA SECURITY PROFESSIONALS ASAP! Just like a fire or medical emergency, time is of…

Ghosts in the machine

Ghosts in the machine

IT Policies and Procedures Do you have a tight onboarding / offboarding checklist you use when hiring a new employee or consultant? If not, it’s likely you have “ghosts in the machine” – people who can still access your data, even though they no longer have an affiliation with your company.  Fortunately, most of the…