Advantages and disadvantages of remote work during a viral outbreak

More and more businesses are implementing remote work because of its numerous benefits. Boost in productivity, access to a wider pool of talent, and lower operating costs are some that immediately come to mind.

But for many small- or medium-sized business (SMB) leaders, deciding whether to stick to an office-based setup and integrating a remote workforce is hardly black and white, especially now during the COVID-19 outbreak.

The menace of insider threats

Today, the risk posed by having sensitive information leaked to the wrong hands is pervasive. Technology has made the storage, accessibility, and shareability of information greater than ever, but the possibility of that information being made available to parties or entities they were not intended for is similarly increased.

Drones: The new attack vector for malware and cybercriminals

Far from being the novelty item they once were, drones now play an important role in industries like manufacturing, agriculture, and construction. They can be used to survey the land, transport materials, and reach areas inaccessible to people.

However, the fact that they’re primarily used for surveillance means they’re an increasingly popular target for hackers.

How should an SMB respond to a security breach?

If you’re the owner of a small- or mid-sized business (SMB), the latest cybersecurity statistics ought to be your wake-up call:

Small businesses account for 43% of breach victims.

Small businesses (1 to 250 employees) are targeted the most with malicious email, at a rate of 1 in every 323.

94% of malware is delivered by email.

Why security awareness training is important for your business

Many New Jersey businesses and residents aren’t strangers to cyber breaches. In 2017, over four million in the Garden State were affected by the Equifax data breach. By 2018, the numbers had been reduced significantly to around 358,000 residents. But this doesn’t mean a decline in data theft; it just emphasizes the massive scale of the Equifax breach.

Top fallacies and facts about zero trust security

Given how zero trust security is getting a lot of attention these days, you may think it’s a new concept. But it was back in 2010 when John Kindervag of Forrester Research first coined the term “zero trust” to describe their security model, which had a simple rule: “Trust no one.

When passwords don’t pass muster: The best alternatives to passwords

You know the drill: you’ve just created an online account, and now you’re asked to come up with a strong password. Certain sites even have password guidelines and will judge the strength of your password: Use at least 12 characters! Use a variety of letters, numbers, punctuation, and special characters! Use upper- and lowercase for letters!

Aside from those, they have other rules you need to remember: Do not use real words found in a dictionary! Do not use real words spelled backwards! Never use your birthday, driver’s license number, street name, favorite color! Never use “password,” “123456789,” “1111111111,” “abc123,” and “qwerty” as passwords!

And so you freeze.

3 Reasons why your business should use a VPN

A virtual private network (VPN) adds security and privacy to public networks, such as wireless hotspots, by rerouting all traffic through a secure server. While VPNs are great for consumers, business-grade solutions offer additional security measures so employees are even more confident they can access the internet safely.

Find out how you can get a functional backup and disaster recovery plan todayRead our FREE eBook
+