{"id":5323,"date":"2018-05-07T00:13:30","date_gmt":"2018-05-07T00:13:30","guid":{"rendered":"https:\/\/cmitsolutions.com\/gilbertmesa\/?p=5323"},"modified":"2025-04-03T05:37:44","modified_gmt":"2025-04-03T10:37:44","slug":"cybersecurity-news-roundup-spring-2018","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/mesa-az-1086\/blog\/cybersecurity-news-roundup-spring-2018\/","title":{"rendered":"Cybersecurity News Roundup (Spring, 2018)"},"content":{"rendered":"<div style=\"width: 85%;text-align: justify;color: #102c59\">\n<div style=\"text-align: center\">\n<p style=\"font-size: 26px;font-weight: 800;color: #b80103;text-align: center\">CYBERSECURITY NEWS ROUNDUP<\/p>\n<\/div>\n<p>In May our team attended the Arizona Technology Council\u2019s 2018 Cybersecurity Summit. It was a long day packed with information about the latest business, consumer, institutional, and public technology, and how to keep it safe. If you follow us on social media, you\u2019ll see us posting photos and highlights throughout the week. Here are takeaways that we think you\u2019ll find helpful and interesting.<\/p>\n<p><span style=\"font-weight: bold;color: #b80103\">1. Cybersecurity and insurance.<\/span> An increasing numbering of insurance agencies are informing their business clients about the importance of cybersecurity. They may even quote you a rate according to your company\u2019s security practices, or lack thereof. We often warn our readers that the majority of small companies that experience significant downtime or data loss do not survive. You may not have believed us, but your insurance company probably does.<\/p>\n<p><span style=\"font-weight: bold;color: #b80103\">2. Small business is unrealistic about cyber threats.<\/span> Small business owners and managers are likely to have completely unrealistic ideas about cyber crime, and what can and can\u2019t be done about ransomware and data theft. Small business tends to handle security and other IT problems on a case by case, (\u201cbreak\/fix\u201d) basis, and then, when they are inevitably attacked, they want to \u201cget back at\u201d the hackers. (Pro tip: This is impossible. And also illegal.)<\/p>\n<p>While larger companies have begun to view managed IT services as a way to help manage risk and attain compliance with industry regulations, smaller companies are still trying to make consumer IT solutions work for business. <span style=\"font-weight: bold;color: #b80103\">(By the way, if you\u2019re a small business or non-profit owner or manager who needs to create an <em>Incident Response Plan<\/em> for your board, insurance company, industry regulators, or your own peace of mind, we can help you do that.)<\/span><\/p>\n<p><span style=\"font-weight: bold;color: #b80103\">3. Cryptojacking.<\/span> The hottest new cybercrime is cryptojacking. That\u2019s when cyber criminals hijack your computer and secretly use it to mine cryptocurrency. Cryptojacking used to only happen when to people who were tricked into installing cryptojacking malware on their systems. Now it can reach you through your browser. What is the solution? <span style=\"font-weight: bold;color: #b80103\">MANAGED FIREWALL.<\/span><\/p>\n<p><span style=\"font-weight: bold;color: #b80103\">4. Don&#8217;t be dumb about smart devices.<\/span> Internet of Things (IoT) devices have a myriad of security problems. These devices simply don\u2019t have the power for sophisticated cyber security tools. If you were to audit all of the devices that are on your network, you\u2019d be surprised by the number of personal devices that are connected &#8212; like your employees\u2019 bluetooth earbuds &#8212; as well as the number of wifi-enabled appliances in your office that are \u201csmarter\u201d than you thought. <span style=\"font-weight: bold;color: #b80103\">(If you\u2019d like to identify each and every device that is on your network, and to whom they are talking, we can help with that.)<\/span><\/p>\n<p><strong>Have questions about these or other topics? We&#8217;d love to chat with you!<\/strong> Give us a call at <a href=\"tel:1-480-926-6445\">480.926.6445,<\/a> or write to us at <a href=\"mailto:gilbertmesa@cmitsolutions.com\">gilbertmesa@cmitsolutions.com<\/a>.<\/p>\n<\/div>\n<h3>Our IT Services<\/h3>\n<table style=\"width: 100%;border: 1px solid black\">\n<tbody>\n<tr>\n<td style=\"padding-left: 20px\"><a href=\"https:\/\/cmitsolutions.com\/mesa-az-1086\/managed-it-service-provider\/\" target=\"_blank\" rel=\"noopener\">Managed IT Services<\/a><\/td>\n<td><a href=\"https:\/\/cmitsolutions.com\/mesa-az-1086\/cybersecurity-solutions\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td>\n<td><a href=\"https:\/\/cmitsolutions.com\/mesa-az-1086\/managed-application-support-service\/\" target=\"_blank\" rel=\"noopener\">Productivity Applications<\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 20px\"><a href=\"https:\/\/cmitsolutions.com\/mesa-az-1086\/it-support-services\/\" target=\"_blank\" rel=\"noopener\">IT Support<\/a><\/td>\n<td><a href=\"https:\/\/cmitsolutions.com\/mesa-az-1086\/managed-cloud-services\/\" target=\"_blank\" rel=\"noopener\">Cloud Services<\/a><\/td>\n<td><a href=\"https:\/\/cmitsolutions.com\/mesa-az-1086\/networking-solutions\/\" target=\"_blank\" rel=\"noopener\">Network Management<\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 20px\"><a href=\"https:\/\/cmitsolutions.com\/mesa-az-1086\/data-compliance-services\/\" target=\"_blank\" rel=\"noopener\">Compliance<\/a><\/td>\n<td><a href=\"https:\/\/cmitsolutions.com\/mesa-az-1086\/data-recovery-backup-services\/\" target=\"_blank\" rel=\"noopener\">Data Backup<\/a><\/td>\n<td><a href=\"https:\/\/cmitsolutions.com\/mesa-az-1086\/unified-communication-services\/\" target=\"_blank\" rel=\"noopener\">Unified Communications<\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 20px\"><a href=\"https:\/\/cmitsolutions.com\/mesa-az-1086\/it-guidance-services\/\" target=\"_blank\" rel=\"noopener\">IT Guidance<\/a><\/td>\n<td><a href=\"https:\/\/cmitsolutions.com\/mesa-az-1086\/it-procurement-services\/\" target=\"_blank\" rel=\"noopener\">IT Procurement<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In May our team attended the Arizona Technology Council\u2019s 2018 Cybersecurity Summit. Here are takeaways that you\u2019ll find helpful and interesting. <\/p>\n","protected":false},"author":199,"featured_media":7335,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[20,43,44,17,34,45,46,22],"class_list":["post-5323","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-advice","tag-business-continuity","tag-cryptojacking","tag-cyber-threats","tag-cybersecurity","tag-information-technology","tag-infosec","tag-insurance","tag-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/mesa-az-1086\/wp-json\/wp\/v2\/posts\/5323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/mesa-az-1086\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/mesa-az-1086\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/mesa-az-1086\/wp-json\/wp\/v2\/users\/199"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/mesa-az-1086\/wp-json\/wp\/v2\/comments?post=5323"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/mesa-az-1086\/wp-json\/wp\/v2\/posts\/5323\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/mesa-az-1086\/wp-json\/wp\/v2\/media\/7335"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/mesa-az-1086\/wp-json\/wp\/v2\/media?parent=5323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/mesa-az-1086\/wp-json\/wp\/v2\/categories?post=5323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/mesa-az-1086\/wp-json\/wp\/v2\/tags?post=5323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}