Blog Search


Searched Tag: PII

Your small business: target for a breach? No...

Small businesses make easy, lucrative targets for ransomware and malware that harvests Personally Identifiable Information (PII). Employee, customer and vendor data can provide cybercriminals with enough information for fraudulent activities, but there ar…
Maybe you think that as a small business, your risk of a data breach is low because larger companies are bigger targets and therefore more desirable to cybercriminals. Think ag…… https://customcomputer.me/blogs/your-small-business-breach-target

Down the Pipeline

Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon. The Colonial Pipeline breach hit the news and many people began to panic. We were all too familiar with uncertainty of the …
Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon. The Colonial Pipeline breach hit the news and …… https://customcomputer.me/blogs/down-pipeline

SMBs: It is Hackers v. You - Don't Let Them Score

Small to mid-sized businesses can be easy and lucrative targets for cybercriminals because they are typically less protected than large corporations and often have valuable information such as credit card information, Social Security numbers, addresses, d…
Selling stolen IDs and other personal data is a lucrative trade for hackers. They are always looking for sources where vital information is stored. As a small to midsize busine…… https://customcomputer.me/blogs/smbs-it-hackers-v-you-dont-let-them-score

Are you subject to Data Protection laws?

Do you understand Data Protection laws as they relate to your business? It is important that you do because they define fully, or in part, what type of data is covered by government regulations, prescribe general standards for the securing of covered data…
This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define fully, or in part, what type of data is covered by government reg…… https://customcomputer.me/blogs/are-you-subject-data-protection-laws

Data Protection Laws and PII

At the Federal level, the United States doesn't have any overarching and comprehensive data protection laws of the sort that most European nations do, but 48 states in the US have some laws requiring private or governmental entities to notify anyone whos…
Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these laws are wide ranging, mo…… https://customcomputer.me/blogs/data-protection-laws-and-pii

Three Responses After a Ransomware Attack

If you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options of recovery available. It has become increasingly common for criminals using ransomware to attack governments, businesses and non-profit institut…
If you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options of recovery available. Ransomware is a type of computer malware th…… https://customcomputer.me/blogs/three-responses-after-ransomware-attack

Avoid Falling Victim to Ransomware

Routinely news breaks that a major corporation or government agency has had its data integrity compromised, with millions of pieces of personal data accessed. In the case of ransomware, the criminals seek payment to "return" your data. It's plain, old fas…
We hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of personal data accessed. In these …… https://customcomputer.me/blogs/avoid-falling-victim-ransomware

Ransomware and Disaster Recovery Plans

Disaster recovery is a basic element of good business continuity planning. Business continuity planning refers to the broad range of plans created so that a business can continue to be operational no matter what negative event might occur. The only real d…
Disaster recovery is a basic element of good business continuity planning. Business continuity planning refers to the broad range of plans created so that a business can contin…… https://customcomputer.me/blogs/ransomware-and-disaster-recovery-plans

Why do You Need a Top-Down Approach to IT Security?

For any organization, its employees are its biggest assets. But what happens when your biggest assets turn out to be your greatest threats or liabilities? That is how cybercrime can change the game. In a recent study, it came to light that employee action…
For any organization, its employees are its biggest assets. But what happens when your biggest assets turn out to be your greatest threats or liabilities? That is how cybercrim…… https://customcomputer.me/blogs/why-do-you-need-top-down-approach-it-security

Online shopping? Watch Out for These Red Flags

Online shopping has opened up a whole new world to us. Get whatever you want, whenever you want, without wandering from store to store. But, did you know cybercriminals love the concept of online shopping as much as you do? Cybercriminals are exploiting t…
Who doesn’t like online shopping? Online shopping has opened up a whole new world to us. Get whatever you want, whenever you want, without wandering from store to store. …… https://customcomputer.me/blogs/online-shopping-watch-out-these-red-flags