What You Will Learn in This Episode: What effective cybersecurity looks like for agency operations — and why you should care The risks every business should be aware of (yes, small agencies too) How cybersecurity and compliance are the same, and also very different Why your policies need to match your practices and how to make sure they do How your employees can either strengthen your cyber defense…or be its greatest weakness What to do to protect your business from big risks — including the ones lurking in your inbox When to start shopping for cyber insurance and how to [...]
2020 has been subject to a myriad of scams that target individuals through different media outlets. Scammers lure victims into fraud by exploiting current events or taking advantage of the fact that people use the internet to job search, look for love, purchase goods, and bank online. Communication Concepts has gathered five of the most common ways scammers target individuals. Stimulus Check Scams With millions of Americans unemployed and furloughed, scammers are exploiting the need for stimulus payments. They send emails or call your phone, acting as though they are banks or the IRS. Whether the scammers say they are [...]
In today's technologically-advanced world, passwords serve as the gatekeepers to nearly every facet of our lives. We use them to secure things from personal accounts containing health or banking information to business networks with confidential internal and client data. Yet we're notoriously bad at creating passwords that protect these details. Creating stronger passwords According to Verizon's 2020 Data Breach Investigations Report, lost or stolen credentials accounted for more than 80% of attacks on web applications, often through the use of brute-force — attacks in which a hacker gains access by guessing your login (username and password). That should come as [...]
With the increase in e-commerce and online marketing, cybersecurity threats are continuing to flood the marketplace. Scammers are adept at using fear to convince people to do irrational things, such as disclosing confidential or financial information. The best guard against scammers is to constantly stay informed about the latest methods they are using in the marketplace. Below are the 5 most popular online methods scammers are using today. Fake Antivirus Software One of the most common scams is an antivirus popup that appears on a computer screen, telling the user that their computer is infected with several viruses that need [...]
According to Glassdoor estimates, a single IT manager pulls an average annual salary of more than $85,000. For small business owners, this can be a tough pill to swallow. You can't afford to operate without an IT expert in your corner to oversee major business functions like data management, information security, or general technical support and troubleshooting — but you may not be able to justify the costs of an on-site team and related infrastructure. Fortunately, there is a cost-effective alternative: Managed Service Providers. Managed Service Provider (MSP) A Managed Service Provider (MSP) is a third-party contractor that offers your [...]
You have probably noticed the "accept cookies" pop up button on websites you visit. Most of the time, you click accept and move on with your business without giving it a second thought. Sometimes, you might be left wondering what are web cookies, and should you be concerned about allowing websites to collect them?
In 2018, 4iQ reported that cybercriminals were preying on small businesses more than ever. The 2020 Verizon Breach Report confirmed that cyberattacks on small companies compromised credentials, personal or medical information, or internal details a combined 96% of the time. Risk is an inherent component of operating a business. Still, not all risk is created equal—and the hidden costs of your next data breach could be enough to bring your organization crashing to the ground. A first step to protecting your business against these and other security threats is to perform regular risk assessments. Risk assessment A risk assessment is [...]
Although offices nationwide have begun the process of reopening, Gallup reported that 59% of employees would prefer to work remotely as much as possible after restrictions have been lifted. One question that arises when considering the implications of working virtually is: how do businesses stay safe if employees use public Wi-Fi?
As the use of technology expands and more individuals utilize social media platforms and emails, phishing has become more complicated and harder to detect. Phishing is a way for scammers to trick victims into clicking on fake URL's and links or posing as other people for the purpose of stealing the victim's personal information.