Technology Advice for Small Businesses

Google studies effects of leaked logins

Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results. The results From March 2016 to March 2017, Google and UC Berkeley… Continue reading Google studies effects of leaked logins

NFL team fumbles their EMR records

News broke recently that the Washington Redskins reported a laptop stolen that contained thousands of medical records for NFL players. The trainer who was responsible for the laptop claims that it did not contain any HIPAA protected data, but the impact remains largely the same. Protected medical information is vulnerable to a host of exposure… Continue reading NFL team fumbles their EMR records

Learn from this NFL team’s EMR fumble

ESPN recently reported that a laptop containing the medical records of thousands of NFL players was stolen from the car of a Washington Redskins’ trainer. And while the team released a statement saying no health information protected under HIPAA guidelines was at risk, the incident shows that EMRs are vulnerable no matter the size of… Continue reading Learn from this NFL team’s EMR fumble

IT Security Policies you need to implement

Most business owners have an employee handbook. But when it comes to the online security of their business, often times this portion is either not adequately addressed, or not addressed at all. However, with cyber crimes an ever increasing threat, and the fact that employee error is one of the most common causes of a… Continue reading IT Security Policies you need to implement

Security policies every business needs

When it comes to Internet security, a reported 87% of small businesses have no security policies in place at at all. And considering that employee error is one of the most common causes of an online security breach, it makes sense to have rules in place that your staff need to follow. So to help… Continue reading Security policies every business needs

Secure your business with these IT policies

Employees are one of your biggest security holes. There is no foolproof prevention method for human error, and this is why employee mistakes are one of the most common causes of a security breach. So what can you do to prevent it? Well at the very least you need to include policies in your employee… Continue reading Secure your business with these IT policies

Google’s War on Password Phishing

internet security concept

Google have recently enrolled a number of their users in a trial to road test a new way of logging in to their Google accounts. The method aims to stamp out the increasing amount of phishing attacks, as well as the issues caused by people (who likely include some of your employees) from using passwords… Continue reading Google’s War on Password Phishing

Google Trials Password-Free Login

Lock icon

Passwords such as “Password123”, “Mycomputer” and the classic “123456” can pose a very real threat to small and medium sized businesses everywhere. Easy to crack and hack, if your staff are logging in to company accounts with over simplified passwords, they are putting your business at risk. Adding to the danger, phishers also know that… Continue reading Google Trials Password-Free Login

Google Tests New Login Option

Smart phone with color apps flying out.

It seems Google is taking the issue of online security increasingly serious as they have recently unveiled their latest attempt to stem the tide of phishing. Trialing a password-free login option, they also aim to curb the dangers caused by ineffective and over simplified passwords – something that every small and medium sized business needs… Continue reading Google Tests New Login Option

Google boosts security with physical keys

If your business is lacking adequate security protection, the doors are wide open to an attack from outside. To make things worse, security threats are constantly evolving and developing, rendering them more difficult to keep up with. At least Google is on your side – its recent introduction of physical Security Keys for Drive for… Continue reading Google boosts security with physical keys