fbpx
Blog

Integrated Business Technologies Blog

Integrated Business Technologies partners with Oklahoma businesses to help align technology needs with business goals.

Control Your Profile, Part III

Control Your Profile, Part III

Social media - we can’t live with it, but we really can’t seem to live without it. People who frequently read our blog will notice how often we discuss Facebook, one of the biggest players in the social media space. Seeing as privacy is one of the biggest concerns today, we’re wrapping up our short series on Facebook by reviewing the settings you might not have realized were options on your Facebook profile.

0 Comments
Continue reading

Control Your Profile, Part II

Control Your Profile, Part II

In part one of this series we started to go through Facebook privacy failings, but we didn’t really give you any information you can use. For part two, we have decided to take you through some security setting for Facebook. 

Facebook has over two billion users, and as a result, it has its fair share of privacy snafus. While they do (finally) make available all of a person’s Facebook information, their strategies to success are important reasons why there are so many privacy concerns throughout the online world. 

0 Comments
Continue reading

Control Your Profile, Part I

Control Your Profile, Part I

If you use Facebook, you’re not alone. There are over two billion active users on the platform. Whether you are willing to accept it or not, Facebook is a huge part of a good chunk of the world’s lives. If being a well-connected, with the times, user has always described who you are, then we could have some helpful information oriented towards you in our blog today. We will be discussing your online identity, and who you have told Facebook you are. 

0 Comments
Continue reading

When It Comes to Payment Cards, Frank Abagnale Gives Credit Where Credit is Due

When It Comes to Payment Cards, Frank Abagnale Gives Credit Where Credit is Due

With more than $16 billion being scammed from more than 16 million people, there is clearly an issue at hand that could use some expert insight. Those who are familiar with Steven Spielberg’s Catch Me If You Can might know that the movie was based on the memoirs of Frank Abagnale, former con man and longtime security consultant of the FBI. With his 45 years of experience with the bureau, Abagnale can safely by considered an expert in cybersecurity and fraud protection.

0 Comments
Continue reading

European Union’s GDPR: One Year Later

European Union’s GDPR: One Year Later

2018 will be remembered as the year where data privacy was altered forever. From Facebook’s many problems to the launch of the European Union’s General Data Protection Regulation, data privacy has never been a bigger issue than it is today. Let’s take a look at how the GDPR has affected the computing world in 2018-19 and how the past year’s events have created new considerations in individual data privacy.

0 Comments
Continue reading

Google Knows Where You Are: Here’s How to Stop Them

Google Knows Where You Are: Here’s How to Stop Them

Late in the summer this past year there were several articles written about how Google would continue to track the location of a person’s smartphone after they had chosen to turn their location settings off. A Princeton researcher corroborated those claims for the Associated Press, traveling through New York and New Jersey with locations services off only to be tracked the entire way. Today, we will discuss this issue, and tell you what you need to know to keep Google from tracking you wherever you go.

0 Comments
Continue reading

Smaller Practices are Choosing Cloud-Based EHR

Smaller Practices are Choosing Cloud-Based EHR

The medical field has spawned all kinds of new technology that takes patient care to the next level. Regulations demand that even smaller practices need to make the jump to electronic medical record systems (also known as electronic health records). These EMR/EHR solutions provide an interface that give providers and patients a way to keep themselves connected to each other--a tool to promote a more efficient delivery method for these services. We’ll take a look at these EMR and EHR solutions that are hosted in the cloud, giving your organization more information to make an educated choice on implementing this software.

0 Comments
Continue reading

Monitoring Pros and Cons

Monitoring Pros and Cons

Dealing with other people, whether in the office or a home environment, can often be troublesome. There is always a case of someone trying to be better than someone else, or trying to take advantage of their naiveté. There are solutions out there that make it easier than ever to help keep your home and business safe. Here are some of the best out there.

0 Comments
Continue reading

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

0 Comments
Continue reading

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

A new email scam is making its rounds and it has a lot of people concerned with just how much a hacker can peer into one’s private life. How would you react if a stranger emailed you saying they had inappropriate webcam footage of you?

0 Comments
Continue reading

Tech Term: Encryption Key

Tech Term: Encryption Key

It is no secret that security is an absolutely crucial part of computing in the modern era. Data can very fairly be called the most valuable currency today, which means it needs to be protected. One way to do this is through the use of encryption keys. In this Tech Term, we’ll go over how these keys can protect your data, and how they do so.

0 Comments
Continue reading

Some Providers are Offering Blockchain as a Service

Some Providers are Offering Blockchain as a Service

There’s a big risk associated with implementing any new technology solution for your organization. For one, it’s difficult to know how a specific solution will run without first implementing it. This leads many businesses to avoid implementing a new solution for fear that it won’t be worth the investment. On the other hand, if they fail to implement a new solution, they could potentially lose out on valuable new tools they could use to succeed. How can you get around this issue?

0 Comments
Continue reading

Tech Term: Encryption

Tech Term: Encryption

Your business’ data is often quite sensitive, which is why the professional world employs cryptology to keep it secure while it’s in transit. In terms of computing systems, this is called encryption. It’s the ideal way to secure important assets when you send or store information.

0 Comments
Continue reading

How Your Smartphone Keeps Your Data Safe

How Your Smartphone Keeps Your Data Safe

Smartphones are the predominant mode of communication, as well as now being the devices most used to access the Internet. With so much depending on the modern smartphone, it has become one of the largest, and most competitive, markets of any consumer item. As a result, manufacturers are building devices with software that is able to encrypt the phone against unauthorized access.

0 Comments
Continue reading

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

0 Comments
Continue reading

Data Security Has to Be A Priority For Your Organization

Data Security Has to Be A Priority For Your Organization

Considering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.

0 Comments
Continue reading

October is Cybersecurity Awareness Month

October is Cybersecurity Awareness Month

Cybercrime is the fastest growing criminal activity in the world. From the largest enterprise to the individual, it can affect anyone, anywhere. To help ensure the cybersecurity of American citizens and their businesses, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) and other agencies work together every October to raise awareness about the threats people face online through a series of educational events and activities.

0 Comments
Continue reading

What Hackers Are Looking For On Your Network

What Hackers Are Looking For On Your Network

When a hacker tries to infiltrate your network, they are doing so with a purpose in mind. Usually they are looking for specific information, like account credentials, personal information, or files that can be used to blackmail victims. Regardless, we’ll go over what a hacker can do with the information that they collect from you, and how you can best protect it from them.

0 Comments
Continue reading

Why Internal Threat Detection is Just as Important as External Threat Protection

Why Internal Threat Detection is Just as Important as External Threat Protection

We all know the dangers of doing business with the Internet. Even a small business has sensitive information that could potentially be stolen. While it’s important to take preventative measures to keep threats out of your infrastructure, it’s equally as important to have measures put into place that can detect threats within your infrastructure.

0 Comments
Continue reading

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

0 Comments
Continue reading

Police Recruit Eagles to Take Out Illegal Drones... Seriously

b2ap3_thumbnail_eagles_for_drones_400.jpgWhile they might seem like glorified toys for adults, drones are fantastic tools that can help people take some breathtaking photos and videos of their local scenery. Unfortunately, as is the case with most good technology, there are people out there who want to use them for nefarious purposes. This leads authorities to a tough question: how do you knock an illegal or dangerous drone out of the sky without harming those down below? The answer is simple: eagles.

0 Comments
Continue reading

Your Network Needs a Virtual Bouncer to Keep Threats Out

b2ap3_thumbnail_security_firewall_400.jpgFirewalls are one of the most common IT security measures on the market today, and for good reason. They act as the first line of defense against any incoming threats, and without them, your organization would have to deal with one data breach after another. Of course, that’s only if you’re taking advantage of a proper firewall; if not, you should seriously consider doing so as soon as possible.

0 Comments
Continue reading

How Sloppy Security Practices Put Companies at Risk

b2ap3_thumbnail_identities_400.jpgIn today’s online business environment, security is nothing to scoff at. Yet, there are many businesses that don’t play by the rules when it comes to monitoring account security on a shared network. This puts both themselves, and their businesses, in danger.

0 Comments
Continue reading

Alert: Malware Locks Up Your PC and Offers Fake Tech Support Phone Number

b2ap3_thumbnail_hack_attack_400.jpgThere’s an intrusive malware on the Internet that locks a user out of their PC and directs them to a fake IT support phone number. In addition to being inconvenient, it can lead to the theft of sensitive information. If this happens to you, whatever you do, don’t call the fake phone number.

0 Comments
Continue reading

How Much Is Your Identity Worth on the Black Market?

b2ap3_thumbnail_the_dark_web_400.jpgHave you ever wondered what hackers do with all of the data they steal on a regular basis? Sure, they could go public with it like they did with the Ashley Madison and Sony hacks, or they could sell it and make some quick cash. Credentials like passwords, usernames, Social Security numbers, and more, can be sold for top dollar in illegal markets, but how much can your identity go for?

0 Comments
Continue reading

Clever Kids and Employees Know How to Bypass Content Filters

b2ap3_thumbnail_use_the_content_filter_400.jpgWith so much nasty content just begging to get viewed on the Internet, it’s understandable why a content filter needs to be integrated into your company’s web viewing protocol. Still, it should be understood that your content filter isn’t going to keep all questionable content away from prying eyes. Therefore, the only way you can really know with certainty that your Internet users aren’t doing anything sketchy is to actively monitor their activity, and check for any suspicious websites.

0 Comments
Continue reading

4 Things to Consider Before Upgrading to Windows 10

b2ap3_thumbnail_why_not_windows_10_400.jpgWe all know that Windows 10 is the hot new operating system released by Microsoft this past July, with slick new features and (gasp!) the Start menu. We’ve been writing a lot of articles about how great and functional the new operating system is. Keep in mind that Windows 10 is a great operating system, but you should also take note of these four shortcomings when considering whether you should immediately upgrade or not.

0 Comments
Continue reading

Now You Can Blame Hackers for Your Next Speeding Ticket

b2ap3_thumbnail_car_hack_400.jpgSince the dawn of the computing age, hackers have taken advantage of all sorts of tactics in order to crack systems and ruin lives. With the Internet of Things bringing connected devices from all over the place into the mix, there are more opportunities than ever to take advantage of unsuspecting users. In fact, even car computers are capable of being hacked.

0 Comments
Continue reading

Two-Factor Authentication: An Easy Way to Make it Hard for Hackers

b2ap3_thumbnail_two_factor_security_400.jpgHave you heard the news? Passwords are old-school methods of authenticating account logins. If you want to maximize the security of your business, using two-factor authentication is your best bet.

Continue reading

3 Ways Your Business Can Benefit from a Private Cloud Solution

b2ap3_thumbnail_private_cloud_is_secure_400.jpgBusinesses are embracing the cloud model as the accepted form of computing, but some are finding that they want more control over their data. When you use a public cloud, you’re relinquishing some control so that you don’t have to deal with network security and hosting. If you’re serious about protecting your data and maintaining the infrastructure yourself, there are several benefits of operating your own private cloud infrastructure.

0 Comments
Continue reading

Security Problems That Shape the Way Businesses View Cybersecurity in 2015

b2ap3_thumbnail_data_security_400.jpgSo far, 2015 has been relatively calm compared to the hack-fest that was 2014. However, we’re only halfway through the year, and there’s still plenty of time for hackers to make short work of networks. Remember, all it takes is a single mistake to expose your business’s network to a host of different threats. Understanding what these threats are and how to handle them is of the utmost importance.

0 Comments
Continue reading

Things Get Ugly When Hackers Turn on Each Other [VIDEO]

b2ap3_thumbnail_hacker_vs_hacker_400.jpgNormally in cybersecurity, we hear about hacking attacks and immediately sympathize with the victim. It’s usually an individual or a business that suffers the most; yet, a recent trend is showing that hackers are lashing out at one another in response to certain threats. In response to a hack from the cyberespionage group Naikon, another group, Hellsing, retaliated with their own attack.

0 Comments
Continue reading

Passwords May Be “Ineffective,” But They’re Still Necessary

b2ap3_thumbnail_security_solution_password_400.jpgIt seems like we can’t go on the Internet without reading about some sort of data breach. Sometimes they’re caused by poor security measures, like lack of data encryption or two-factor authentication; other times, it’s because of lackluster password security. Despite the antiquity of the username and password, they’re staples in the modern office. Thus, it’s important that they’re as secure as possible at all times.

0 Comments
Continue reading

Tip of the Week: How to Pick a Secure PIN

b2ap3_thumbnail_pin_tips_400.jpgHow much thought have you put into selecting your debit card PIN? If you’ve not put any thought into your PIN, then it’s likely the case that you’ve picked a number that’s easy to remember or even one that’s associated with something personal. Fact: Taking time to pick random and hard-to-remember numbers greatly improves PIN security.

0 Comments
Continue reading

Tip of the Week: Revamp Your Password Policy with a Password Manager

b2ap3_thumbnail_password_security_400.jpgChanging your password is a pain. After you’ve gone several months with the same one, it can be difficult to remember your new password. Despite this, it’s always recommended that you change your passwords often. Unfortunately, when you change all of your passwords often, it’s even easier to forget them. Instead of using a post-it note on your monitor, you should instead try using a password manager.

0 Comments
Continue reading

Smartphones Call For Smart Security

b2ap3_thumbnail_smartphone_security_400.jpgWe always talk about protecting your computers and servers from outside threats, but what about protecting your smartphones? There isn’t much difference between a smartphone and a computer. They both function in very similar ways with access to a variety of apps, social media, and browsers. Your smartphone could hold much more valuable data than just contacts or text messages.

0 Comments
Continue reading

The US Military Plans to Bring Biometric Passwords to the Public

b2ap3_thumbnail_biometric_security_systems_400.jpgHumans are always trying to improve security protocols that can protect against increasingly advanced online threats. Unfortunately, the threats only grow stronger in response, and the war against malicious online activity rages on. Biometrics are security measures that are growing in popularity, but are expensive and difficult to integrate. Now, the US military is funding a campaign to make it more readily available to end users.

0 Comments
Continue reading

Massive Healthcare Provider Anthem Hacked: How to Protect Yourself

b2ap3_thumbnail_it_health_security_400.jpgProbably one of the more dangerous hacks so far in 2015, healthcare-provider Anthem has been breached by hackers and its data accessed. The breach may have provided the hackers with up to 80 million sensitive customer records, including Social Security numbers, dates of birth, and much, much more.

0 Comments
Continue reading

All You Need is Love... and a Network Security Solution

b2ap3_thumbnail_all_you_need_is_love_400.jpgHave you tried online dating? There are many happy couples who attribute their love to the matchmaking algorithm of an online website. Internet dating is a legitimate option for modern singles, but like most good things on the web, naive users run a risk of getting scammed.

0 Comments
Continue reading

Tip of the Week: 4 Android Device Lock Settings

b2ap3_thumbnail_android_security_400.jpgThe busy business owner keeps sensitive work-related information stored on their mobile device. If he lost the device, it could have disastrous results, especially if the device were to fall into the hands of an experienced hacker or competitor. Just in case, it’s a best practice to always lock your mobile devices. How do you choose the Android lock feature which is right for your unique needs?

0 Comments
Continue reading

Even the 911 Address Database Can Get Hacked

b2ap3_thumbnail_911_gets_hacked_400.jpgPeople dial 911 when they’re in some sort of trouble or in the event of an emergency. If not for the hotline, who knows how many lives could be lost daily. Sometimes, however, help doesn’t come, even when dispatchers have received the call and responded. This generally isn’t the fault of the dispatchers, but rather the criminals who have undermined the rescue efforts thanks to some unorthodox hacking.

0 Comments
Continue reading

4 Signs You’ve Been Hacked

b2ap3_thumbnail_secure_your_computer_400.jpgWhen a virus infects your computer, you may not know about it until it’s too late. Like a biological virus, the damage it does to your system can be minimized if it’s caught early on. Stopping a computer virus early is possible if you know what symptoms to look for. Is your PC infected? Here are four signs you’ve been hacked.

0 Comments
Continue reading

Scam Artists Turn to ID Spoofing to Get You to Answer the Phone

b2ap3_thumbnail_phone_fraud_400.jpgWith all the attention given today to scams over the Internet, it’s easy to neglect classic scams like con artists using the phone to exploit people. You may think that you’re safe because you have a smartphone with caller ID, but thanks to new spoofing tactics, reliable defenses like caller ID can no longer be depended upon to safeguard you from telemarketer scum.

0 Comments
Continue reading

Hackers Lay Claim to 4½ Million Medical Records

b2ap3_thumbnail_stethescope_keyboard_400.jpgIf 2014 hasn't been a legendary year for data breaches yet, it certainly is now. Community Health Systems, a hospital network for over 206 facilities across the United States, has been the target of a data breach resulting in 4.5 million records being compromised by Chinese hackers, including Social Security numbers, birthdays, names, addresses, and telephone numbers.

0 Comments
Continue reading

Hairballs and WiFi Data are What the Cat Dragged In

b2ap3_thumbnail_warkitteh_on_the_loose_400.jpgFor Washington D.C. residents, there's a dubious threat looming in their backyards putting their personal data at risk. It's Coco, a Siamese cat wearing a high-tech collar designed for hacking WiFi networks. Have you taken the proper security measures to protect your sensitive information from feline foes like Coco?

0 Comments
Continue reading

When it Rains, it Pours – Keep Your Cloud-Based Data Safe

b2ap3_thumbnail_keep_cloud_data_safe_400.jpgDo you see those black clouds culminating on the horizon? They represent the possibility that hackers will gain access to your cloud storage. Though it is protected a number of ways, it will not stop an experienced hacker. To them, your defenses are as transparent as those thin, wispy, cirrus clouds that are so welcome on a boiling hot summer day.

0 Comments
Continue reading

How an Intimate Selfie That’s Deleted Can Be Recovered and Used for Blackmail

b2ap3_thumbnail_smartphone_security_400.jpgWhen it comes time to upgrade, many smartphone users will sell off their old device in hopes of making extra cash. However, if the phone's memory is improperly wiped, an experienced hacker can use advanced tools to recover sensitive data off the used phone. Let's talk about how this happens and what can possibly be recovered by a hacker.

0 Comments
Continue reading

Apple’s iOS May Contain Backdoors to Leak Sensitive Information

b2ap3_thumbnail_ios_vulnerability_is_curious_400.jpgApple's iOS operating system might be well known for its impressive security features, but that doesn't mean that it's invulnerable to all threats. In fact, backdoors may have been located in the operating system, which allow Apple and law enforcement agencies like the NSA to access the devices.

0 Comments
Continue reading

Escape the Phisherman’s Hook – 4 Tips to Get You off the Line

b2ap3_thumbnail_phishing_scams_400.jpgThe Internet is a vast ocean filled with all sorts of different creatures. Many are harmless, like the bottlenose dolphin, but once in a while you will encounter an aggressive shark. But no matter how powerful or intelligent these creatures are, they still wind up flopping around on the deck of some fisherman's boat. Why? Because fishermen know what they're looking for and how to capture it. The same can be said about Internet phishers.

0 Comments
Continue reading

The Virtual Hand that Terrorizes the Cradle

b2ap3_thumbnail_internet_connected_security_400.jpgIn today's connected home, Internet security needs to extend beyond the PC. Any device that's connected to the Internet needs to be password protected, secured with a firewall, and utilize available security apps. These precautions should be taken even with seemingly harmless devices like baby monitors. A family from Ohio recently learned this lesson the hard way.

0 Comments
Continue reading

Internet Security: This Is Why We Can’t Have Nice Things!

b2ap3_thumbnail_security_from_hackers_400.jpgWhen you were a kid, did you ever ask your parents for a cool new toy only to have your request denied because you were in the habit of breaking everything? Your parents would point out your destructive habit and tell you, "This is why we can't have nice things." As an adult, the coolest toy is the Internet and hackers want to break it.

0 Comments
Continue reading

Alert: Heartbleed Bug Threatens Popular Websites!

b2ap3_thumbnail_bleeing_heart_one_400.jpgOn April 7th, a new bug on the Internet was discovered that's putting millions of users' personal data at risk. Given the name "Heartbleed bug," it's capable of allowing infiltrators to collect information while you are securely browsing a SSL/TLS website. Since SSL/TLS is so widely used, it's very probably that your personal data is at risk.

0 Comments
Continue reading

How the Personal Information of 200 Million Users Wound Up on an Illegal ID Theft Service

b2ap3_thumbnail_secure_the_information_you_can_400.jpgYou're likely familiar with the various ways that hackers can steal your identity, but you may not be familiar with how hackers anonymously buy and sell people's personal information to interested parties. This is done through online ID theft services and a December hearing before the U.S. Senate highlights how one service was selling personal records on more than 200 million Americans!

0 Comments
Continue reading

What do Hackers Want with Your Email?

b2ap3_thumbnail_hackers_are_after_you_400.jpgThe value of your email account cannot be understated. You may think less of your email inbox because there are so many other ways to digitally communicate, but to a hacker, your email is a goldmine of valuable information. You may use your email less than ever before, but that doesn't mean you can neglect email security.

0 Comments
Continue reading

2 Million Passwords Stolen! Have You been Hacked?

b2ap3_thumbnail_pword400.jpgOn December 3, 2013, security company Trustwave discovered over two million stolen user passwords for popular online services like Facebook, LinkedIn, Google, Twitter, Yahoo, and 93,000 other websites. There's a high probability that you use one of the services affected by the hack. Is your personal information compromised?

0 Comments
Continue reading

Protect Your Business with Intelligent Surveillance Cameras

b2ap3_thumbnail_cam400.jpgThe world you do business in is a pretty dangerous and messed up place, and things always seem to be getting worse. Thankfully, security technology is improving, which helps offset the risks of living in a perilous world. You can take advantage of these security improvements by installing intelligent surveillance cameras for your business.

0 Comments
Continue reading

How to Protect Your Cloud Hosted Data from Security Breaches

b2ap3_thumbnail_secure400.jpgRecently, Adobe sent out e-mails and letters to users notifying everyone of a security breach. "The attackers may have obtained access to your Adobe ID and encrypted password." The obvious question here is, "How do I protect myself and my business from such attacks?" The unfortunate answer is you can't, but you can marginalize the impact by taking some common sense measures.

0 Comments
Continue reading

Trojan:Win32/Crilock.A Nasty Ransomware You Need to Guard Against

b2ap3_thumbnail_virus1-400.jpgOn September 10th, 2013, a new ransomware known as Trojan:Win32/Crilock.A began attacking computers all over the Internet, locking users out of their PCs and putting sensitive information at risk. If your computer gets it, then you're in for a world of hurt. Here are the details on what this virus does and what you can do to prevent it.

0 Comments
Continue reading

It’s Time to Reevaluate How You Share Photos

b2ap3_thumbnail_selfie400.jpgIf you use a smartphone to take personal pictures and post them to the Internet, then you may unknowingly be posting more about yourself than you want to, like where and when the picture was taken. This information in the hands of the wrong person can lead to dangerous consequences, like theft of your property, your identity, or even kidnapping.

0 Comments
Continue reading

Don’t Forfeit Your Command-and-Control Center To a Zombie Army

b2ap3_thumbnail_zomb400.jpgWith an increase in Distributed Denial of Service (DDOS) attacks and packet flooding volume, its evident that hackers are using compromised web servers for their malicious activities. By infecting servers, these dastardly infiltrators create a Zombie command-and-control center to direct their malicious activities from.

0 Comments
Continue reading

Russia Protects Communications by Using Typewriters

b2ap3_thumbnail_typewriter400.jpgIf you have been following international news headlines with stories like WikiLeaks spreading confidential documents, and recent revelations about a US surveillance scandal, it kind of feels like we are in the middle of Spy vs. Spy. As nations look for stronger security solutions to protect themselves, Russia is looking to older technology to keep their communications safe.

0 Comments
Continue reading

Know the Risks of the Internet before Logging On

b2ap3_thumbnail_virus400_20130617-141157_1.jpgDriving a powerful car can be an exhilarating experience, but if you have no idea what you're doing, it can be dangerous. This is why governments require drivers to pass a safety class before they can speed down the road encased in steel and glass. The Internet is also a powerful tool that can be exciting, beneficial, and dangerous.

0 Comments
Continue reading

Bury Your Treasured Files With TrueCrypt

b2ap3_thumbnail_tcsquare400.jpgHow vulnerable is your sensitive data on your PC to unwanted threats? Can anyone who gains access to your computer be able to easily find this data and do whatever they wish to it? If these files were encrypted and then hidden from view, you can neutralize the possibility of it happening.

0 Comments
Continue reading

Can a Cell Phone Kill Switch Deter Theft?

b2ap3_thumbnail_KillSwitch400.jpgAs smartphone ownership continues to rise (175 million cellphones sold last year in the US), so too does smartphone theft. Take San Francisco, CA as an example, half of all robberies reported last year were phone-related. To help curb this trend, crime fighting agencies are seeking help from phone manufacturers in developing a smartphone kill switch.

0 Comments
Continue reading

Hackers are Taking Advantage of Technology Improvements

b2ap3_thumbnail_HackerSkull400.jpgUsing strong passwords is a critical part of keeping your network protected. For years we have been preaching the need to use complex passwords, along with the need to use different passwords for different accounts. As the technology of crackers (not the salted kind) improves, the need to be diligent about password security intensifies.

 

0 Comments
Continue reading

Who Can You Trust with Your Data?

Your company's information on your network is labeled as "sensitive" for a reason. The files on your servers contain the secrets to your success, along with financial records about you, your employees, and your customers. When trusting sensitive data to a third party, make sure that it is someone you trust.

0 Comments
Continue reading

Business Executives are Targeted with Whaling Scams

b2ap3_thumbnail_Whaling400.jpgEven if you are using the best antivirus software available, sensitive company data can still be compromised by users falling victim to phishing scams. Phishing is a tactic where scammers trick users into giving out their personal information, usually through deceptive spam e-mails. Looking to fry bigger fish, scammers are trying their luck at whaling.

0 Comments
Continue reading

Don’t Underestimate the Hackers

b2ap3_thumbnail_Hacker400.jpgIn 2011, Ponemon Research surveyed 583 U.S. businesses and found that 90% of respondents reported that their company's computers had been breached at least once by hackers within the past year; 77% of these companies felt like they were attacked multiple times within the same year. If your SMB does not have any protection from hackers, then your sensitive data is at serious risk.

0 Comments
Continue reading

Stolen Device Damage Control

laptopstealer.jpgThe smartphone ownership rate for American adults increased to 46% in 2012, this according to a study by Pew Research. This study does not include other mobile devices like tablets, laptops, and notebooks, but the use of these devices is also growing, with worldwide sales for just smartphones and tablets projected to hit 1.2 billion in 2013.  

0 Comments
Continue reading

4 Tips to Shop Securely Online

laptopstealer.jpgThe 2012 holiday online shopping season is shaping up to be the biggest yet. Harris Interactive conducted a survey regarding this holiday season, and found that 51% of Americans plan on shopping online this year. Everybody has different reasons to shop online, 71% of respondents thought they could find better deals, and 31% want to simply avoid the crowds.

0 Comments
Continue reading

How Safe is Your Email?

 

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Oklahoma small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

0 Comments
Continue reading

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

FOLLOW US