It is important to first understand that every business, regardless of size… collects, manages, manipulates, and stores some amount of Personally Identifiable Information (PII) from its customers, partners, and vendors. That means that every business, regardless of size, has the inherent responsibility (even under law) to guard and protect not only its own proprietary data, but also the data that it collects, manages and stores from others.
Most businesses can find a way to deal with whatever life throws at them as long as they can continue to do business. But, what happens when something impacts that ability? When a business can not continue to operate and perform normal business functions, the company’s reputation is greatly impacted. Therefore, every company’s survival greatly depends on how quickly they can return to normal operations.
The Click2Gov bill payment system has been hacked in eight cities across the United States starting in August 2019. This latest breach of Click2Gov affects 20,000 records from those eight US cities, and while only eight cities have been breached, the compromised payment cards belong to people across all 50 states.
Does your business use “Smart” TVs, “Smart” Monitoring Systems, or any other type of Internet of Things (IoT) “Smart” devices? Then be well aware, these devices may be spying on you and stealing your data!
Extended support for Windows 7(Win7), Windows Server 2008/2008R2(Svr2008R2), and Windows Small Business Server 2011(SBS2011) will end on January 14, 2020. Microsoft moved these operating systems to extended support on January 13, 2015, but after January 2020, they will no longer receive vendor supported updates. Any system that is no longer supported by the vendor is truly not secure…
Many businesses use third-party IT vendors that, host, store, process, or access information records and supply management of the technology infrastructure related to their organization. Far too many IT providers use “Security” as a buzz word to foster higher sales rather than actually possessing verified working knowledge and experience to securely manage business networks. This is a situation that should never be taken lightly, as your business and its clientele are truly at risk in doing so.