Voted Best Network Integrator in Arizona (623) 688-TECH (8324)

By: azdatacom | January 16, 2017

  If only online security issues could be solved with sorcery: a magic wand, some incantations, and poof! Troubles disappear.


  Sadly, magic only works in books and movies. Out here in the real world, the bad guys always have the advantage, and you need more than wizardry to keep them off your network.


  Criminals that ply their trade in cyberspace are mostly driven by economics. They might be after the banking credentials for your small business so they can drain funds from online accounts. If your business is connected to sensitive industries, the bad guys might be foreign agents intent on stealing secrets. Or maybe they're in the ransomware business, hoping to encrypt one of your PCs so they can demand a ransom to unlock it.


...

By: azdatacom | January 16, 2017

 "We're missing a laptop!"   These words are not something you want to hear, but the chances are, it's going to happen at some point. Unfortunately, data on the majority of SMB laptops is not encrypted, so what exactly does it mean for your company if this happens?


   It means that if the bad guys pull the hard drive from the missing laptop and plug it into a running system, then chances are they can access to your data. A simple user ID and password are not going to be adequate protection.

   Are the thieves going to bother even looking at the stolen laptop? Many years ago, the hardware itself would fetch a decent amount on auction sites as "previously owned." With the professionalization o...

By: azdatacom | July 31, 2016

The next time you're chatting with the CEO of your company, find a way to work this question into the conversation: what percentage of the organization's official business do you conduct using your personal email account?


On this topic, let the cyber-scandal involving Hillary Clinton serve as a cautionary tale. The former U.S Secretary of State is under fire for exclusively using her personal email account in all job-related matters, according to The New York Times, which first reported the story.


"Mrs. Clinton did not have a government email address during her four-year tenure at the State Department," the report says. "Her aides took no actions to have her personal emails preserved on department servers at the time, as req...

Category: Uncategorized 

Tags:

By: azdatacom | July 31, 2016

Back in my day, a good antivirus (AV) product was all you needed to protect a network. Patches were mostly bug fixes, and the Internet was relatively safe.


High-speed Internet changed everything. Back in the days of dial up, the bandwidth did not exist to provide a cybercriminal with decent access to your network. The connection wasn't 24/7 either. Users connected to the Internet, did what was needed, and logged off so someone could use the phone line to make a call.


Ah, the good old days...


Fast forward 20 years or so.


Like Bob Seger sang:Twenty yearsWhere'd they go?Twenty yearsI don't know


Sigh, where did they go?


Anyway, the point is, today almost every computer connects to high-speed Internet, 24/7. This change alone paved the way for cybercr...

Category: Uncategorized 

Tags:

<<prev