One recurring topic that continues to come up is the idea of outsourcing your IT, and when is the appropriate time to start taking a serious look at that model. Whether it’s because of budgetary constraints or a laundry list of other reasons, sometimes it’s in your best interest to find a strategic partner that…
The Dangers of the Inbox
Every now and then, an email with a catchy subject line appears in your inbox and you end up clicking on it, either because you’re curious about the subject line or because you assume the sender is trustworthy. Unfortunately, this is how most cyberattacks tend to begin – with a single click. What unfolds next…
COVID-19 Workplace Case Recording: Technical Considerations
As our clients begin the process to safely reopen their facilities to workers, we have received numerous questions focused on the collection, transmittal, and storage of information related to employee medical information related to COVID-19. The following guidance was prepared to assist anyone that may need a starting point as they determine their organization’s course…
Protecting yourself from vendor fraud
What is vendor fraud? Vendor fraud occurs when a fraudster poses as a person or entity you know and trust (a vendor, an executive, etc.) and requests a change to banking information. If the fraudster can convince you to change payment information and you make the payment, any payments sent will go to the fraudster…
Common-Sense Tips to Reduce Your Cyber Risks
At Infonaligy, we deal with many companies who approach us for assistance with improving their organizational cybersecurity. Cybersecurity is a complex topic with lots of moving parts. Very few organizations have an IT environment that could be classified as ‘simple’, and what works in one environment may not work in another. Starting with a solid…
CMMC April Update
Beginning in 2020, any contractor or subcontractor doing business with the Department of Defense will be required to undergo a third-party audit of their cybersecurity maturity under the framework of the Cybersecurity Maturity Model Certification (CMMC). Although some important details and requirements are still being defined, here’s what you need to know to start preparing…
Quick List of Major Security Breaches Over the Last Few Years
It seems we are seeing a new cyber event in the news every day. From local government agencies to major corporations, this is not slowing down. Below, you will see a list of the most significant data breaches in history. Please keep in mind, these companies have teams of security personnel and millions of dollars…
Ransomware costs up, causes 10-day downtime
As Ransomware continues to rise, new reports are showing an increase in the impact towards organizations. Here are a few that were covered: Cyber criminals are cashing in so we will continue to see an increase an phishing scams and attacks on Remote Desktops. We are only as strong as our weakest line, so what…
Florida city pays $600k to hackers
Another victim to the thousands of cyber attacks on local governments and city offices. This time the criminals were paid quite handsomely. Can your organization afford to spend $600k in ransom then another million to replace all hardware? How did the hackers get in? Someone clicked on a phishing email because they had no security…
Ransomware only attacking Small to Medium sized businesses.
ZDNet talks through the focus of most ransomware and the shift towards the SMB space. According to the latest report by Kaspersky, hackers using this ransomware target smaller companies as their are easier targets and the seizure of their data is more catastrophic. This makes them pay the ransom a lot faster. See if you’re…