Get a Quote

Cyber Security Blog

Stay informed on the latest cyber security threats, news, insights and advice from Chris Zambuto, our Chief Information Security Officer.

Featured Post

5 Ways to Build Privacy Awareness At Work

5 Ways to Build Privacy Awareness at Work

Data privacy and data security go hand in hand. Our lives and the digital world become more and more intertwined every day. While the digital world has afforded us a whole new level of convenience and access to information, it is imperative that employees remember the best practices for protecting company data and ensuring it is being used the right way. Here are five ways businesses can build privacy awareness at work to shore up their data and empower employee cybersecurity. How #PrivacyAware is your organization?

Continue Reading >

How Businesses Can Put Privacy First

How Businesses Can Put Privacy First

With the global big data market set to be worth nearly $235 billion by 2026, to say that data is now core to business success today would be a massive understatement. From tweaking shipping strategies to delivering more relevant advertising campaigns to customers, businesses are constantly looking for ways to make more data-driven decisions. But with this access to consumer data comes great responsibility…

Continue Reading >

4 Key Steps to Securing Your Passwords

4 Key Steps To Securing Your Passwords

Passwords aren’t easy, they aren’t very much fun, but they certainly are not something you should worry about. Since passwords are required for accessing nearly everything online today, it should be no surprise that 81% of hacking-related computer breaches leveraged either stolen and/or weak passwords. Poor password practices are a huge security and privacy risk for you, your company and your customers. Unfortunately, they are incredibly important and poor password practices are often the starting point for hackers breaking into your…

Continue Reading >

Prioritizing Cybersecurity In a Hybrid Workspace

Prioritizing Cybersecurity In A Hybrid Workplace

In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to rise to a market value of $157 billion by 2023, and the number of installed connected devices in the home is expected to rise by a staggering 70% by 2025. In this new normal where smart devices and consequently online safety are…

Continue Reading >

Cybersecurity Risk Assessment

Where To Start – The Cybersecurity Risk Assessment

Is your business safe? Our clients ask themselves this question every day. In the last year alone, we’ve seen a major increase in cybersecurity questions. Everyone wants a quick way to find out. Many put off worrying until there is a real problem. While October is Cybersecurity Awareness Month and we’re pushing as much education awareness as possible, business owners are still confused about whether or not cyber attacks are a real threat…

Continue Reading >

How To Catch Phishing Red Flags

How To Catch Phishing Red Flags

Phishing attacks and scams have thrived since the COVID pandemic began in 2020 and today, phishing attacks account for more than 80 percent of reported security incidents. Week 2 of Cybersecurity  Awareness Month stresses the importance of being wary of phishing emails, text messages or chat boxes that come from…

Continue Reading >

Be Cyber Smart - Know The Basics

Be Cyber Smart – Know The Basics

Every October, Cybersecurity Awareness Month raises awareness about the importance of cybersecurity and ensures that everyone has the information and tools they need to be safer online. More than ever before, technology plays a part in almost everything we do…

Continue Reading >

Why SMBs Should Invest in Cyber Security

Why SMBs Should Invest In Cyber Security

In the recent wake of T-Mobile’s massive data breach and Apple’s latest cyber security flaw, it’s time organizations step up their security to protect their companies and customers information. Incidents such as these are happening more frequently and with no end in sight. In 2021…

Continue Reading >

Cyber Extortion is the New Ransomware

Cyber Extortion is the New Ransomware

The last time we blogged about ransomware we talked about how it works, the top three ways it occurs, and how it infiltrates a system from start to finish. In its most basic form, a ransomware attack is when hackers encrypt your files and extort you to pay their ransom in order to regain access to your data…

Continue Reading >

IoT Privacy Guidelines

Internet of Things (IoT) Privacy Guidelines

Today most of us have many IoT devices in our homes and offices. In case you don’t know, IoT is an acronym for Internet of Things. What is that? IoT are devices that connect to internet like your personal assistant (Echo (Alexa) or Google Home), smart thermostat (Nest), smart TVs, etc. These devices that were once a novelty…

Continue Reading >

Vulnerability Management Why You Need It

Vulnerability Management – Why You Need It

Vulnerability management is a fundamental aspect of an information security and privacy program. If done well it provides a strong foundation for your company, its data and your clients’ data. Done poorly, and the doors are wide open for your company to be hacked, its data breached, and your clients’ privacy violated. So, you…

Continue Reading >

How To Help Employees Respect Data Privacy

How To Help Employees Respect Data Privacy

Security and data privacy practitioners mark their calendars every year to recognize Data Privacy Day on January 28. According to the National Cyber Security Alliance (NCSA) Data Privacy Day is “an international effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust.”

Continue Reading >

The-Biggest-Cybersecurity-Mistakes-You-Don't-Want-To-Make

The Biggest Cybersecurity Mistakes You Don’t Want To Make

It’s surprising how many people are clueless about the security of their online behavior. Have you ever wondered if your data or passwords are on the dark web? Have you ever looked? According to a recent Varonis survey, 64 percent of Americans have never even checked to see if they were affected by a data breach…

Continue Reading >

Employee Cybersecurity Awareness Training Topics

Employee Cybersecurity Training Topics

It’s no surprise that human error is considered the biggest cybersecurity vulnerability for organizations. Managing worrisome employee behavior is perceived as the greatest concern and most difficult insider threat for companies to detect, according to a 2020 CyberEdge Report. Much of this happens due to either a lack of user…

Continue Reading >

8 Tips to Own Your Role in Cybersecurity

8 Tips to Own Your Role in Cybersecurity

The final week of Cybersecurity Awareness Month looks at the future of connected devices. Technological innovations, such as 5G, are rapidly changing our world. The 5G WiFi network arrived faster than we ever anticipated and is currently available in some US cities. While the underdeveloped network does not yet live up to…

Continue Reading >

Securing Medical Devices and Healthcare Data

Securing Medical Devices & Healthcare Data

The healthcare industry is increasingly relying upon internet-connected devices and solutions to improve patient care, organizational efficiency, speed of crisis response, and much more. The emergence of telemedicine, digital health records, internet-connected medical devices, patient wellness apps, and an increasing amount of third parties entering the health supply chain…

Continue Reading >

Securing Devices at home and work image

Home Office Security Best Practices

2020 has been a challenge for all us. As many businesses moved from on-site work to working from home, we’ve all made adjustments. Most notably working from home a company loses some insights into the security and privacy of its work force and its data. Here’s a quick list of best practices you can do to boost your home office security during the pandemic and after.

Continue Reading >

3 Ways To Protect Your Devices

Connect It, Protect It: 3 Ways to Protect Your Devices

The first week of Cybersecurity Awareness Month highlights the ways in which internet-connected devices have impacted our lives and will empower all users to own their role in security by taking steps to reduce their risks. Any device connected to any network can potentially be compromised by a hacker. It’s critical to make sure your devices are regularly patched, backed up, are…

Continue Reading >

2020 Cybersecurity Trends on the rise

2020 Cybersecurity Trends on the Rise

Not only did we not see the COVID-19 pandemic coming, but as a country we also were not adequately prepared to fight it on multiple levels. That same insufficient response is exactly how a business feels when blindsided and debilitated by a cyber-attack. The following cybersecurity processes, technologies and trends are most likely to gain attention and investment…

Continue Reading >

CCPA compliance main image

Does CCPA Apply To My Business?

The California Consumer Protection Act (CCPA) went into effect on January 1, 2020. In brief, “the CCPA grants California consumers robust data privacy rights and control over their personal information, including the right to know, the right to delete, and the right to opt-out of the sale of personal information that businesses collect, as well as additional protections for minors.” Notably…

Continue Reading >

How To Safely Navigate A SSL Certificate Error

There’s no doubt that you’ve run into this issue at some point while browsing online. You were happily navigating to one of your favorite sites when all of a sudden you run into an SSL certificate error. So, what do you do? Do you proceed at your own peril? Should you not visit the site? Are there other options? Is this your website? So many questions. Hopefully, by understanding the causes of this issue, you can…

Continue Reading >

Protecting Your Company From Ransomware

Last month we warned ransomware attacks are on the rise amidst the COVID-19 pandemic. While these attacks are bad enough in the best of times, ransomware continues to be a huge information security problem for all companies, municipalities and individuals. Even hospitals and healthcare professionals are getting warned about possible attacks as they provide care during this critical time. How prepared…

Continue Reading >

Working At Home During COVID-19

Working At Home Impacts During Covid-19

Hopefully everyone who can work remotely is now working remotely due to government-mandated social distancing and stay-at-home advisories for COVID-19. Whether you’re a novice at working from home or a seasoned veteran, you will likely be affected by these at home privacy concerns, IT-related service impacts, and the latest Coronavirus cyber scams. Here’s what you should do to make your work at home experience…

Continue Reading >

Don't Get Hooked: Phishing Vishing Smishing

Don’t Get Hooked: Phishing, Vishing & Smishing

Phishing continues to be a huge security problem for everyone. While more than half of US organizations were successfully compromised by ransomware and phishing attacks last year according to Proofpoint, it also reported 90 percent of global organizations were targeted by business email compromise and spear phishing attacks. This ever-growing privacy risk…

Continue Reading >

How To Manage Your Data Privacy Settings

Every year privacy and security practitioners mark Data Privacy Day. This unique day falls on January 28 every year and is touted as “an international effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust.” You’re probably thinking to yourself, well that sounds great but what does that mean to me and my company?

Continue Reading >

Safety Tips for Online Holiday Shopping

No matter which holidays you celebrate, you want to enjoy them with friends and family. You also want to make sure you protect yourself from online scams and theft. More and more shoppers choose to do online holiday shopping rather visit brick and mortar stores. The National Retail Federation forecast that online sales are expected to grow between 11% and 14% for…

Continue Reading >

Busting The Top 10 Cybersecurity Myths

Navigating the world of cybersecurity can be overwhelming. Any wonder why the percentage of U.S. employees who lack a basic understanding of cybersecurity best practices is estimated to be 70%? One thing remains certain. No matter how large or small – any business (or employee) that thinks they are not at risk for a cyber attack is only fooling themselves.

Continue Reading >

The 15 Most Effective Cybersecurity Awareness Tactics Image

The 15 Most Effective Cybersecurity Tactics Every SMB Should Be Doing

October is Cybersecurity Awareness Month. Did you know… one in five small businesses will suffer a cyber breach this year? 81% of all breaches happen to small and medium sized businesses? To help boost awareness, we compiled a Cybersecurity Awareness Checklist with the 15 most effective tactics your security team should be doing to protect your company, your staff, and your clients’ data from a cyber-attack.

Continue Reading >

Limiting Your Damage From A Data Breach

Today’s data breach epidemic is serious. Not a week goes by without another story in the news about another large data breach. Unfortunately, these breaches are becoming all too common and, in many instances, it seems there’s little you can do to prevent them. Luckily there are several things you can do to protect your specific accounts in order to limit the damage from these breaches and reduce the time to recover.

Continue Reading >

5 Ways To Protect Your Data In Mobile Apps

Most apps need to collect some personal information in order to function. For example, one needs to provide personal information if you want to use a dating app in order to get connected with the people you are interested in, but what is that personal information used for, who is it shared with, how is it protected…

Continue Reading >

Here’s What Your Business Needs To Know About GDPR

It’s been a little over a year since the General Data Protection Regulation (GDPR) went into effect and like all one-year-olds, the first year can be a challenge. Let’s review what the GDPR is, walk through the results from the first year, and ensure you know the proper data security precautions for your business in order to comply….

Continue Reading >

Is Your Information Safe From The Dark Web?

The dark web is getting a lot of attention lately. Cybercriminals leverage the anonymous nature of the dark web to launch attacks on a company’s network and on individuals. The dark web is also a hiding place for loot stolen from these cyber attacks and is an exchange where criminals can sell their wares—i.e. your stolen data….

Continue Reading >

Let’s talk about your IT needs and how we can help

Want to know about the latest cybersecurity insights for your business?

QuickTips

Watch Out for Spam Emails That Capitalize on Current Events

Watch Out for Spam Emails That Capitalize on Current Events

Receive a Message Urging Immediate Action? Proceed With Caution Cybersecurity experts report a recent rise in phishing emails—particularly those that capitalize on current events...

Continue Reading >
Extend Cybersecurity to Apps Like Microsoft Teams

Extend Cybersecurity to Apps Like Microsoft Teams

Protect Information & Platforms as Workers Return to the Office Over the last two years, collaborative apps like Microsoft Teams, Zoom, and Slack have...

Continue Reading >
Cybersecurity Risks Surge as Russia-Ukraine Conflict Escalates

Cybersecurity Risks Surge as Russia-Ukraine Conflict Escalates

Protect Your Business Now as Global Conflict Grows Last week, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a new advisory directing...

Continue Reading >
Sick of Your Slow Computer?

Sick of Your Slow Computer?

5 Ways to Improve the Performance of Desktops and Laptops In today’s always-connected digital world, multi-tasking is a must. Throughout an average workday, most...

Continue Reading >

RELIABLE SUPPORT + PROVEN VALUE

Contact us today to learn more about what CMIT offers as Your Technology Team.