Posts Tagged ' hack'

We are pleased to present below all posts tagged with ' hack'. If you still can't find what you are looking for, try using the search box.

Cybersecurity: It’s A Game and They Are Winning

It is similar to a Chess Game, but different: Each day, the small business owner is busy focusing on running his shop. He has customers to please, suppliers to deal with, product to promote and daily issues to address. He has little time each day to consider of all the ramifications of making sure that all his data is protected. He knows that it is important, but with all his responsibilities, he cannot give this aspect of his business, the attention it deserves. The hacker, sits in front of the computer, focused on the task of stealing your data. That is his day, his purpose, his job and he is very good at it.  He knows that the small business owner has many things to concentrate on. He understands “small business vulnerability” and he uses it to his advantage. He also knows that big business has teams dedicated to making sure that their data is secure and firewalls are strong, so he chooses to target the mom and pop shops. One player is focused on the game, the other di ...

Popular tags: , , , , , , , , , , , , , ,

Threat Detected - Has your computer's been infected?

You cannot flip through the newspapers, listen to the radio or scroll through online headlines without hearing about, this organization or that business being hacked or having their computers infiltrated by a virus. Even with amazing anti-viral software, installed firewalls and constant software updates, Hackers are always changing it up, so that what is protected yesterday is vulnerable today. So, with the constant cat and mouse game that seems to exist in the virtual world, how exactly do you know if your computer has been hacked or is experiencing a virus? Here are some tell-tale signs: 1. Fake antivirus messages- We have all experienced it. To click onto a website and suddenly you receive the dreaded Fake Antivirus Warning Message. Once you see this message the damage has been done. Clicking “No” Or “Cancel will not stop the process, your system has been exploited.  2. Your Computer Seems to Be Going Nowhere: The fan is on, the disk is spinning away, but nothing’s happen ...

Popular tags: , , , , , , , ,

Finally, businesses are listening to this great advice

An article came across my desk last week, that immediately caught my attention. A recent story in CFO online magazine has given me the news I had been hoping for. Finally, I am seeing the results of everything I have been working for, recommending, advocating and advising my clients, for the last 10-years…. Love this statistic: “A September survey by the Risk and Insurance Management Society found that 80% of the companies recently surveyed, purchased a stand-alone cyber-security policy in 2016.” The takeaway: Policies covering exclusively cyber exposures are becoming the new normal for many large companies. Yahoo! Mail, is one of the largest and latest data hacks that has grab headlines since Sept 22nd. More than 500 million users saw their passwords, phone numbers and other information accessed in an ongoing data breach. This continuous cavalcade of data breaches, ransom-ware, cyber extortions, theft of trade secrets and theft of intellectual property, has affected major corporation ...

Popular tags: , , , , , , , , , ,

Cyber Criminals - More than Just the Geek in the Basement

Usually in movies they are portrayed as a maniacal recluse. Sitting in front of multiple computer screens, with AC/DC blasting and crumpled cups of coffee and Red Bull scattered all over the desk and the floor. Or as a “V for Vendetta”, Guy Fawkes-styled freedom fighters with a score to settle. Cyber Criminals, Hackers, Data Thieves are the designations we have given them. And they come in all shapes, sizes and forms, from all walks of life, male/female, rich and poor. Their motivation is as varied as their backgrounds. Some choose to become hackers because they seek revenge on someone who betrayed them. This category includes employees of businesses; citizens angry against the government; lovers who feel they have been wronged. Other cyber criminals are looking for monetary gain, often holding data “hostage”. Businesses need to pay a “ransom’ to receive a “key” to be able to unlock and access their data. Since the inception of mainframes and shared/networke ...

Popular tags: , , , , , , , , , , , , , ,

National Cyber Security Awareness Month … Why Insurance is the only TRUE protection in the war of Cyber-Security …

October is National Cyber-Security Awareness Month. Not many people are knowledgeable of this fact, as October is filled with many causes and national observances. But the purpose of designated months is to break through the clutter and serve as a quick reminder. Although we have made great strides in the last two years to make business owners aware of the issues, some are still at, what I refer to as, the “disregard” stage when the topic of “Cyber-Security” is raised.  For many, Cyber-Security is simply a headline on the nightly news, a sound bite, a bit of conversation that passes through. It doesn’t seem real. They consider it something that happens to other companies, other businesses that are not vigilant. Ironically even businesses that are aware, take precautions, know the risks and attempt to secure their information, can often find themselves vulnerable. I was curious to read stories of small business owners and their thoughts on Cyber-Security and I was n ...

Popular tags: , , , , , , , , , , , , , , ,