According to Forbes, approximately 2 million Americans leave their jobs every month. Regardless of whether you are in a small business or a Fortune 500 company, there are critically important steps that I.T. administrators should take when an employee leaves. Even if the employee voluntarily left on great terms, it is critical to offboard the employee properly. A recent study found that 89% of employees still had access to their company’s network and data after being let go. If someone can still log in to servers, access confidential data, or even just tweet in the company’s name, they can wreak havoc in ways that reflect very poorly on the company - and on the I.T. staff within the company responsible for network and data security. Insider attacks, including those by terminated employees, can be very costly and damaging. An organization in the U.S. faces an average of 3.8 insider attacks per year. We have put together a checklist of steps that should be completed immediately upon an employee departure.
Are your computers at home as secure as those you use at the office? In most cases, the PCs or Macs we use at home do not have the same level of protection as what businesses typically provide.
Since the year 2000, when the Electronic Signatures in Global and International Commerce Act became a U.S. Federal law, “e-signing” digital documents has become a convenience for many businesses, large and small. It saves time, it saves trees, but is it putting your company at risk?
A firewall separates the internet from your private network. It filters traffic in both directions and protects your network from DoS (Denial-of-Service) attacks, viruses, and hacking. Unfortunately, end users are still the biggest security risks and client-side attacks are inevitable. Thankfully, technology such as Security Heartbeat restricts network access to endpoints as soon as they become compromised.
In today’s Internet, there is never a break from the constantly evolving threats of phishing, malware, ransomware, and hackers. It is critical that as these new I.T. security threats evolve, IT and information security also evolves with them.
In the world of technology, there are new products and solutions coming to the market every day. Every once in a while, a new technology appears that stands out and disrupts the space it is in. The Datto Siris 3 is such a product - so much so that I’ve started call it the swiss army knife of data protection and business continuity. Not only is it a powerful business continuity solution, but it is one of the most effective tools in the fight against ransomware.
The workplace is becoming increasingly mobile with users accessing corporate data from anywhere at any time. While this trend offers organizations significant productivity benefits, it also increases the risk of data loss that could cause irreparable harm.
Implementing security has traditionally been a clear cut decision. Because viruses were bad, anti-virus software often was deployed without user buy-in. However, since data loss prevention (DLP) deals with user privacy, user acceptance is imperative. Here are som e best practices that you can use to achieve buy in as you figure out how to implement a data loss prevention strategy:
California may be one of the most desirable places to live in the U.S., but we also have a plethora of natural catastrophes that we must live with and be prepared for. Earthquakes, fires, floods, mud slides and tsunamis can and do affect us here on the Central Coast. Unfortunately, most businesses are not ready to cope with these types of natural calamities.
The vast majority of data breaches have occurred through compromised authentication. Although having a strong password is an important part of security, this is only one step to securing your network and data. That’s why multi-factor authentication is so important and why security experts today are strongly recommending it for critical business systems.