Blog Search


Searched Tag: data breach

Your small business: target for a breach? No...

Small businesses make easy, lucrative targets for ransomware and malware that harvests Personally Identifiable Information (PII). Employee, customer and vendor data can provide cybercriminals with enough information for fraudulent activities, but there ar…
Maybe you think that as a small business, your risk of a data breach is low because larger companies are bigger targets and therefore more desirable to cybercriminals. Think ag…… https://customcomputer.me/blogs/your-small-business-breach-target

Mobile Devices: Convenient and Useful, but Present Special Risks

Most of us use smart phones for business and our personal lives, and uses are growing. However, due to their size, rendering of content often obscures information that would more readily identify malicious content. Here are tips to make your use less pron…
Who doesn't have a smartphone? We conduct business from them, run our homes, shop, bank and track our health from them. How many have given up landline phones and only use thei…… https://customcomputer.me/blogs/mobile-devices-convenient-and-useful-present-special-risks

Keeping your data safe: Access Control

Protecting your data is achieved by a combination of practices. Are you covering all the bases?
Cyberattacks are commonplace today. Malware such as viruses, worms and more recently ransomware not only corrupt your data or hold it hostage, but also inflict irreversible damag…… https://customcomputer.me/blogs/keeping-your-data-safe-access-control

Think you are too small to be targeted by a cybercriminal? Think again.

Do you have a false sense of security? Small businesses actually make fairly lucrative targets and impacts on the small business can be more harmful than for larger ones.
When I meet with clients, especially SMBs, I often hear them say that they feel their business is too insignificant to be a target of cyber-criminals. Why would someone go after …… https://customcomputer.me/blogs/think-you-are-too-small-be-targeted-cybercriminal-think-again

Ransomware emails: How to identify and steer clear of them

Ransomware attacks have suddenly become more prevalent. Each year sees more of them. Hospitals, NPOs, shipping giants, etc., have all been victims of ransomware attacks. Your business could be too! Did you know that emails are one of the most common gatew…
Ransomware attacks have suddenly become more prevalent. Each year sees more of them. Hospitals, NPOs, shipping giants, etc., have all been victims of ransomware attacks. Your b…… https://customcomputer.me/blogs/ransomware-emails-how-identify-and-steer-clear-them

Who is regulated by HIPAA?

Does HIPAA regulation cover your business? There are two categories of entities who are regulated by HIPAA and are required to be in full compliance.
Does HIPAA regulation cover your business? There are two categories of entities who are regulated by HIPAA and are required to be in full compliance. Covered Entity This is th…… https://customcomputer.me/blogs/who-regulated-hipaa

It is Heaven! Using the Cloud to Challenge Big Business

What is the cloud? How can it benefit your business?
Has anyone suggested you begin moving your business to the cloud? Cloud data storage or cloud computing? What is this, anyway? And isn't it something for huge companies? …… https://customcomputer.me/blogs/it-heaven-using-cloud-challenge-big-business

Loss of Data: Causes and Prevention

The time and resources that technology saves are invaluable, but this convenience has a very ugly side. This convenience brings costs, which could include irreparable financial, professional, and social damage. The technology that is designed to make life…
The adoption of technology from the simplest of matters to the most complex problems has rendered us heavily dependent on it. We love paying our bills minutes before they are due…… https://customcomputer.me/blogs/loss-data-causes-and-prevention

WFH: Remote Data Access and Data Security

When your employees are working in your offices, you control their methods of access to company data, but once access goes remote, data security becomes a bigger challenge. It is an issue that you have to consider when evaluating WFH policies.
This may be the single biggest concern you may have to address when looking at WFH. When your employees are working in your offices, you control their methods of access to comp…… https://customcomputer.me/blogs/wfh-remote-data-access-and-data-security

Everyday Human Error Can Affect Data Protection

Are you under the impression that data loss is all about putting up firewalls to protect against evil cyberattacks? Some of the biggest sources of data loss include sloppiness, human error, and just plain forgetfulness.
Are you under the impression that data loss is all about putting up firewalls to protect against evil cyberattacks? Some of the biggest sources of data loss include sloppiness,…… https://customcomputer.me/blogs/everyday-human-error-can-affect-data-protection