Posts Tagged ' security'

We are pleased to present below all posts tagged with ' security'. If you still can't find what you are looking for, try using the search box.

Cybersecurity: It’s A Game and They Are Winning

It is similar to a Chess Game, but different: Each day, the small business owner is busy focusing on running his shop. He has customers to please, suppliers to deal with, product to promote and daily issues to address. He has little time each day to consider of all the ramifications of making sure that all his data is protected. He knows that it is important, but with all his responsibilities, he cannot give this aspect of his business, the attention it deserves. The hacker, sits in front of the computer, focused on the task of stealing your data. That is his day, his purpose, his job and he is very good at it.  He knows that the small business owner has many things to concentrate on. He understands “small business vulnerability” and he uses it to his advantage. He also knows that big business has teams dedicated to making sure that their data is secure and firewalls are strong, so he chooses to target the mom and pop shops. One player is focused on the game, the other di ...

Popular tags: , , , , , , , , , , , , , ,

Your Trash, Talks! Saving Yourself from the Stress of a Break –In.

You feel so very violated. You arrive home after a wonderful weeklong “de-stressing” vacation, park the car in the driveway, turn the key, open the door and step inside. Suddenly you realize that something is a bit askew. Nothing is where it should be. And then you realize it. You have been robbed.   You don’t understand it. You stopped mail and newspaper delivery, had automatic timers placed on the lights and asked your neighbor to mow your lawn while you were gone, why did this happen? You did everything the checklist on the "Safety Tips Website"  told you to. Most thieves are not stupid. They read the same “Safety Tips” lists that you do. They know what you are thinking. Often, modern thieves do not pick a house at random. They have been scoping out the neighborhood long before you were the chosen one and they did their research before they decided to give you the honor of their breaking into your home. Preparing to NOT be a victim happens long before you pack ...

Popular tags: , , , , , , , , ,

Finally, businesses are listening to this great advice

An article came across my desk last week, that immediately caught my attention. A recent story in CFO online magazine has given me the news I had been hoping for. Finally, I am seeing the results of everything I have been working for, recommending, advocating and advising my clients, for the last 10-years…. Love this statistic: “A September survey by the Risk and Insurance Management Society found that 80% of the companies recently surveyed, purchased a stand-alone cyber-security policy in 2016.” The takeaway: Policies covering exclusively cyber exposures are becoming the new normal for many large companies. Yahoo! Mail, is one of the largest and latest data hacks that has grab headlines since Sept 22nd. More than 500 million users saw their passwords, phone numbers and other information accessed in an ongoing data breach. This continuous cavalcade of data breaches, ransom-ware, cyber extortions, theft of trade secrets and theft of intellectual property, has affected major corporation ...

Popular tags: , , , , , , , , , ,

But He Just Entered Kindergarten! Insurance Tips for Students Leaving For College

I am sure that you feel like I am rushing things. I understand that your child has barely taken off his cap and gown and the high school diploma has not been framed and hung in the family room yet; but it is the second week of July and time is moving forward.  In less than six weeks, he will be heading off to college lugging pillows and comforters, stockpiles of shampoo and Axe Spray. Making checklists and searching the aisles of Walmart and Target for printer paper, bathroom cleaner and posters to decorate the dorm walls. You might think you have everything completed the day you leave the driveway and head towards the next four years of your child’s life. But you may be forgetting something.  What about insurance? Most people do not consider the insurance ramifications of sending a child off to live away from home. But it is a life-altering event and insurance plays a part in making sure that he is protected and secure when he is out of your sight. There are two specific insurance p ...

Popular tags: , , , , , , , , , ,

Cyber Criminals - More than Just the Geek in the Basement

Usually in movies they are portrayed as a maniacal recluse. Sitting in front of multiple computer screens, with AC/DC blasting and crumpled cups of coffee and Red Bull scattered all over the desk and the floor. Or as a “V for Vendetta”, Guy Fawkes-styled freedom fighters with a score to settle. Cyber Criminals, Hackers, Data Thieves are the designations we have given them. And they come in all shapes, sizes and forms, from all walks of life, male/female, rich and poor. Their motivation is as varied as their backgrounds. Some choose to become hackers because they seek revenge on someone who betrayed them. This category includes employees of businesses; citizens angry against the government; lovers who feel they have been wronged. Other cyber criminals are looking for monetary gain, often holding data “hostage”. Businesses need to pay a “ransom’ to receive a “key” to be able to unlock and access their data. Since the inception of mainframes and shared/networke ...

Popular tags: , , , , , , , , , , , , , ,

There are over 300 security/data breaches every single minute...

The NYSE halted trading last week due to a “technical issue”.  Almost every headline and ticker running on CNN, CNBC, or The New York Times immediately blasted the message: “Officials Deny Cyber-Attack.” The Wall Street Journal and United Airlines followed up that day with their own computer issues. It’s become the first “go to” thought in everyone’s mind every time a snafu, a glitch or a complication occurs, Data Breach, Cyber Attack, and Security Compromise.  All data and computer infrastructure has become vulnerable.


Popular tags: , , , , , , , ,

Enjoying this Pina Colada on Captive Island! (While someone is home stealing my Scotch)

One of the exciting aspects of going on vacation is the thrill and joy of sharing it with other people.  Riding a Cable Car in San Francisco, standing at the top of the Empire State Building, climbing through the Grand Canyon … who doesn’t want to post “their excitement” immediately to Facebook, Twitter, Pinterest, Tumblr and Instagram? But Computer Security Experts warn against, what seems to most people, to be such a harmless practice. 1.     “Enjoying a Yummy Lobster Tail at the Shell Shake in Maine.  Wish you were here!” – This simple status update on Facebook immediately signals to crooks that you are away from home, and targets your house for possible looting. If a Facebook Friend “likes” your status it is possible that that information will be shared on someone’s Newsfeed, enabling them to see your home is unguarded. 2.     “The skies the limit! Nancy Smith and Jennifer Jones Para-sail ...

Popular tags: , , , , , ,