Posted on 3/27/2017 10:33 AM By Keith Savino
It is similar to a Chess Game, but different:
Each day, the small business owner is busy focusing on running his shop. He has customers to please, suppliers to deal with, product to promote and daily issues to address. He has little time each day to consider of all the ramifications of making sure that all his data is protected. He knows that it is important, but with all his responsibilities, he cannot give this aspect of his business, the attention it deserves.
The hacker, sits in front of the computer, focused on the task of stealing your data. That is his day, his purpose, his job and he is very good at it. He knows that the small business owner has many things to concentrate on. He understands “small business vulnerability” and he uses it to his advantage. He also knows that big business has teams dedicated to making sure that their data is secure and firewalls are strong, so he chooses to target the mom and pop shops.
One player is focused on the game, the other di ...
Posted on 7/25/2016 8:00 AM By Rich Savino
My office is located on the corner of one of the busiest intersections in Warwick. South Street and Main. The windows overlook the streets and we have a bird’s eye view of the all the crazy happenings that occur on a daily basis. Jaywalking, parking tickets, the occasional street argument and road rage. During the summer, when school is out, Warwick becomes particularly quiet and sleepy. It is as if the entire town packs up and leaves for sunnier destinations… Except something strange has occurred in the last three weeks to change this quiet little country town into the land of Pikachu seeking Zombies …. The "Pokemon Go" phenomenon.
Now honestly I do believe that anything that makes teenagers and sedentary children rise from the couch, leave the house and walk is a great idea. And Nintendo has done an outstanding job with Pokemon Go, forcing kids to earn points and capture creatures by simply moving. But I have also seen some really dangerous safety issues when people are playing, ...
Posted on 6/17/2016 8:10 PM By Keith Savino
Usually in movies they are portrayed as a maniacal recluse. Sitting in front of multiple computer screens, with AC/DC blasting and crumpled cups of coffee and Red Bull scattered all over the desk and the floor. Or as a “V for Vendetta”, Guy Fawkes-styled freedom fighters with a score to settle. Cyber Criminals, Hackers, Data Thieves are the designations we have given them. And they come in all shapes, sizes and forms, from all walks of life, male/female, rich and poor.
Their motivation is as varied as their backgrounds. Some choose to become hackers because they seek revenge on someone who betrayed them. This category includes employees of businesses; citizens angry against the government; lovers who feel they have been wronged. Other cyber criminals are looking for monetary gain, often holding data “hostage”. Businesses need to pay a “ransom’ to receive a “key” to be able to unlock and access their data.
Since the inception of mainframes and shared/networke ...
Posted on 10/5/2015 8:00 AM By Keith Savino
October is National Cyber-Security Awareness Month. Not many people are knowledgeable of this fact, as October is filled with many causes and national observances. But the purpose of designated months is to break through the clutter and serve as a quick reminder.
Although we have made great strides in the last two years to make business owners aware of the issues, some are still at, what I refer to as, the “disregard” stage when the topic of “Cyber-Security” is raised. For many, Cyber-Security is simply a headline on the nightly news, a sound bite, a bit of conversation that passes through. It doesn’t seem real. They consider it something that happens to other companies, other businesses that are not vigilant. Ironically even businesses that are aware, take precautions, know the risks and attempt to secure their information, can often find themselves vulnerable.
I was curious to read stories of small business owners and their thoughts on Cyber-Security and I was n ...
Posted on 3/30/2015 8:00 AM By Keith Savino
Most consumers are savvy enough to understand the basics of how to protect your private information from cyber criminals. Secure websites, periodically changing your passwords, distinctive alpha numeric passwords are all aspects of safeguarding your information. But with each improvement made to keep our private information “private,” cyber criminals are looking to attack us and get the details they desire, via other means.