Be Sure to Back Up Your Cloud Data
Some organizations move their data to the cloud and stop backing it up. Cloud services offer ways to restore the data. But what happens if an attacker deletes your files and deletes the backup at the cloud service too? Consider backing up your data at a different cloud service. It is less likely that an […]Continue Reading
If You Outsource Your IT, it is Their Job to Keep You Happy, Not the Other Way Around.
After we performed a cybersecurity audit for a company many years ago, the President and CEO assigned the recommendations to their IT consulting firm. What is different about this lead executive is that he gently applies firm pressure on their IT consultants to complete the recommended improvements. He’s kind and respectful to his consulting company, […]Continue Reading
Microsoft Lets You Stop Using Passwords
Attackers steal passwords, people forget passwords, resetting passwords is a pain. Microsoft provides a way to remove passwords from your Microsoft account. That way, you can log in without passwords to Microsoft Office, Teams, Outlook, OneDrive, Windows, and other Microsoft products. You still must prove it is you logging in, and you could use a […]Continue Reading
Attackers Scan Your Network for These Folder Names
Attackers Scan Your Network for These Folder Names Once attackers gain access to a network, before they make themselves known, they explore your files to Locate cyber insurance policies to determine what your coverage limits are. Find financial statements to determine how much ransom you can afford to pay. Look for the most sensitive files […]Continue Reading