Ransomware Refresher: 5 Best Practices for Fighting Today’s Biggest Cyber-Threat

GettyImages_459434713
  • October 17, 2017
  • Print This Post
Ransomware, a piece of malware that blocks access to data and/or systems until a sum of money is paid, is the number one cyber-threat facing business organizations today, per the “2017 SANS Data Protection Survey” released last month. Nearly half of the frontline cybersecurity professionals polled by the SANS Institute,

Ransomware: A Cyber-Disaster Threatening Your Business Continuity

phishing
  • October 3, 2017
  • Print This Post
Nothing focuses business leaders on Business Continuity (BC) and Disaster Recovery (DR) measures more than a natural disaster. Given record-breaking events such as Tropical Storms Harvey and Irma, the heightened attention is understandable. When surge currents lap at your door, the need for urgent, immediate response hits businesses in the face

Malware Manual – Part 6: 3 Steps to Recover from a Cyber Attack

malware security
  • September 27, 2017
  • Print This Post
For several weeks now, we have been touting the Cybersecurity Framework developed by the National Institute of Standards and Technology (NIST). The NIST framework encapsulates a thorough, structured approach to managing cybersecurity holistically according to five tenets: Identify Protect Detect Respond Recover In this final installment of our “Malware Manual”

Malware Manual – Part 5: 3 Keys for Cybersecurity Response Planning

password-people
  • September 21, 2017
  • Print This Post
Last month, the international research and advisory company Gartner, Inc., predicted global corporate spending on IT security will increase 7% this year over 2016 to roughly $86.4 billion. And looking forward, Gartner forecasts IT security will swell to $93 billion by the end of 2018. The driver of all this

Malware Manual – Part 4: Basic Tactics for Cybersecurity Monitoring & Maintenance

GettyImages_459434713
  • September 13, 2017
  • Print This Post
In the last installment of our Malware Manual series, we called today’s business security challenges a “cyber siege in the digital realm” because to many companies – large or small – the onslaught of cybercrime can feel like one. Why? Check out this sampling of recent headlines from around the

Malware Manual – Part 3: Your Best Fortification to Survive a Data Breach

  • August 10, 2017
  • Print This Post
Anyone who reads business books is familiar with military analogies for many aspects of running an organization – from strategic planning to operational efficiency. Leadership gurus encourage CEOs to read Sun Tzu’s The Art of War to learn strategy, as management consultants cite the work of famous generals for tactical

Malware Manual – Part 2: Building Your Cybersecurity Policy

Businesswoman holding digital tablet with showing umbrella icon on blackboard, insurance concept
  • August 8, 2017
  • Print This Post
Malware breaches are proliferating, per recent research shared by TechRepublic. The digital investigation firm Guidance Software surveyed more than 300 professionals in North America that hold IT security positions or perform tasks that fall within the IT security realm. Here are a few of the trends researchers discovered: More than

6 Must Have IT Security Policies to Safeguard Your Business

safeguard SMB
  • July 27, 2017
  • Print This Post
What better way to introduce the second installment in our IT Policy Primer series, IT Security Policies and Framework, than drawing from that wellspring of corporate wisdom, Dilbert. In an episode of the long-running satirical strip, Dilbert’s pointy-haired Boss ambles officiously into the bespectacled worker’s cube to announce the creation

IT Policies and Why They’re Essential to SMB Success

it policy
  • July 12, 2017
  • Print This Post
There’s no shortage of advice available to SMBs about using information technology (IT) to secure their company. We share plenty of it right here, in fact. But deploying the latest technology does little to protect a small business without enforceable, strategy-driven IT policies to clearly guide its use. Why IT

Malware Manual – Part 1: Recognizing Your Risk

malware security
  • July 6, 2017
  • Print This Post
Ransomware has been grabbing headlines in recent months, with attacks starting in countries such as the UK or Ukraine and then sweeping across the globe. High-profile industries, such as healthcare, have been targeted as victimized organizations vary from care providers to equipment suppliers. But instead of piquing the interest of
Need Help with your IT?

Find a Location
Near You.

Gain
weekly
insight

into the evolving world of IT for business.
Subscribe now.

Follow Us
Friend me on FacebookFollow me on TwitterFollow my company on LinkedInRSS Feed

Follow us on Twitter

About

ITinflections is a blog that covers a wide range of technology-based articles IT in the workplace, focusing on small- to medium-sized businesses.

If you’re looking to improve your company’s productivity through the effective use of technology, enjoy ITinflections, the blog about technology for business.