Blog

Categories
Ransomware Cybersecurity - Prevention Blog

Q: How does your firewall protect you from ransomware?

It doesn’t. There are critical tools every organization needs in place to protect against cyber threats. Firewalls, anti-virus software, managed DNS, and encryption are a few you may already be using. But no protection is 100% effective at stopping hackers, because the bad guys are evolving their tools as often as the good guys are developing protections.

Categories
Cybersecurity - Prevention Cybersecurity - Detection and Response Blog

What is a Security Operations Center (SOC)?

If your firewall and antivirus are the locked doors of your IT, then a Security Operations Center is the alarm system and the police who respond to a break-in. It is a mix of tools, processes, and people looking for threats in order to quickly stop them and prevent damage. Essentially, it’s real-time threat detection and response.

Categories
Cybersecurity - Prevention

Why You Should Use Multi-Factor Authentication

For years, you’ve used strong passwords to protect your data. Your IT team even set up policies to prevent the use of weak passwords like “password123”. This method of authenticating, or verifying your employees’ identities, kept the bad guys out.

Categories
Blog Security Alerts

Critical Security Alert: Windows 10 Vulnerabilities

Microsoft issued critical security patches for Windows 10 on August 13th and is warning all users to update their operating system immediately.  Microsoft discovered multiple vulnerabilities that can allow machines to spread malware without any user interaction.

Categories
Blog Cybersecurity - Detection and Response Cybersecurity - Prevention

A Security Operations Center for your organization

By now, you know how important cybersecurity tools are as part of your IT plan. And you know that even with many layers of security, a hacker may still find a way in to your network. In fact, hackers often assume small organizations are not as careful as large corporations, so they see businesses like yours as easy targets. On top of that, most organizations don’t find out about a security breach for over a month. If that’s not good enough for your organization, you need to know about WorkSmart’s Security Operations Center (SOC) service.

Categories
Cybersecurity - Prevention

Do you need security policies?

When most folks think about cybersecurity, they think about the tools—firewalls, anti-virus software, web filtering, etc. That’s smart. We always recommend a multi-layered approach to security.

Categories
Ransomware Cybersecurity - Detection and Response

Have you received a ransom email?

Have you received an email from a hacker trying to blackmail you in exchange for ransom? And did it include a real password you’ve used in the past (or still use)? You’re not alone, and the only thing you should do about it is change any compromised passwords. These extortion email scams have been going on all year, and this article explains one of the recent iterations.

Categories
Blog Cybersecurity - Prevention Employee-friendly Content

Security Awareness Training: Don’t let an employee ruin your day

You’ve set up your organization’s cybersecurity—considering firewall, anti-virus, DNS and web filtering, your wireless network… and on and on. You’ve made all the difficult IT security decisions to protect your business, but just one well-meaning employee that clicks one malicious link in one little email can open the door for a hacker to defeat all your defenses.

Categories
Blog Cybersecurity - Prevention Employee-friendly Content

Pssst: Our Password Protocol Advice

Let’s start by clearing the air: It’s normal to have a love-hate relationship with passwords. It’s hard not to love the very things that keep your information safe, ensure private conversations are kept private, and give you peace of mind to go about your business.

Categories
Cybersecurity - Prevention Blog Cybersecurity - Detection and Response

Wi-Fi Network Security: Take Another Look

We’re all accustomed to hopping on wireless networks whenever we can—saving data use on our mobile devices. And we appreciate when the office or coffee shop or school makes it easy for us to connect any time we visit. For most organizations, offering guest Wi-Fi access is a must. But is having a simple password enough to keep company data safe?