Take a moment to consider your answer to this question, "What would you do if all of your business's data was somehow lost overnight?" How would you react, and what would you do about it? Your data is valuable, so much in fact that your business would be lost without it, and likely wouldn't be able to run properly.
Macro Systems Blog
When it comes to owning anything expensive, it's important to practice proper maintenance. One of the most basic things you can do to take better care of your computer is to periodically examine the software on your computer. Although software maintenance can be challenging at times, it can be incredibly rewarding.
In December 2013, retail superpower Target was the target (hehe) of a massive data breach that could have affected as many as 110 million customers. On Monday, May 5, 2014, the CEO of Target, Gregg Steinhafel, announced that he would be stepping down, no doubt a result of the chaos that engulfed his company in the aftermath of this data breach. Target's CFO, John Mulligan, has stepped in as interim CEO until the position is filled once again.
GameOver Zeus, a member of the Zeus family of malware, has been discovered and disrupted by the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice. But, this is only a temporary respite from the danger the malware poses - in two weeks, the threat will be back, and very much alive.
Firewalls are the first thing companies think of when it comes to data security. What is the last security risk on an organization's mind? Your most tech-savvy employee. If someone were to "get to" the employee overseeing your network, they would be able to do some serious damage. What are you doing to protect your data from the employees you trust the most?
Many websites around the world are still suffering from the nasty little bug called Heartbleed that we covered last month. This prompted over 30,000 TLS/SSL certificates to be revoked and reissued, but many of them were reissued with the same keys. If this was going to happen, why revoke and reissue them in the first place? They're still just as vulnerable as before, since Heartbleed could have leaked those same keys weeks ago.
eBay issued an official declaration on Wednesday, May 21, 2014 that one of its databases had been hacked. The worst part? This database, which housed users' passwords, was compromised. But, there is a silver lining to all of this - no information has been stolen.
None that they know of, anyway. The auctioning website is still cautioning users to change their passwords in light of the attack.
It's no secret that the Internet is full of dangerous activity. Too many people think their networks are safe without any kind of protection. We don't mean to say that the Internet isn't safe, but that it's only as safe as you make it for yourself. In order to keep your small business safe, you should implement protective software, like a firewall. A firewall can help keep your company safe from online threats, and believe us when we say that a little bit of protection goes a long way.
The Internet Explorer vulnerability that was discovered early last week was so intense that the United States and United Kingdom deemed it necessary to issue a warning. Found in six different versions of Internet Explorer, anyone who used the browser was at risk. The bug allowed hackers to potentially take over your computer and install malware or steal personal information. But fear not - on May 1st 2014, Microsoft issued a patch that ends this bug's reign of terror.
On May 4th you may see more Star Wars T-shirts than normal. This is because May 4th is recognized around the galaxy as Star Wars Day (May the 4th be with you). Thanks to the abundant use of technology throughout this science fiction franchise, you can bet your podracer that we can find an IT lesson from Star Wars that can help your business!
There's nothing quite like the feeling of getting scammed, and the scammers of today love using technology to rip you off and leave you with that sinking scammy feeling. The best way to avoid scams is to be proactive and know what to look for. New to your list of scams to be on the look out for are fake apps.
2014 has been a year of technological advancement, but with any kind of advances such as these, there will always be those who want to steal the work of others. According to the Identity Theft Resource Center and , as of March this year, there have been 204 instances of data breaches this year alone. These affected companies are perfect examples of why web protection is important. Macro Systems can provide you with this protection and peace of mind. Here are a few of the more unbelievable breaches, most of which could have been easily avoided.
Is your wireless router an older model? If it is, then you owe it to yourself to upgrade the latest model. Depending on your Internet connection, upgrading your wireless router may be the easiest way to increase your bandwidth. Next-gen routers also come with new easy-to-use security features that don't require passwords, making an upgrade worth the effort.
April 7th 2014 was a big day for the world, not only because Microsoft ended security support for Windows XP, but because a massive security flaw was found in the OpenSSL cryptographic library. This problem, called the Heartbleed bug, was found by Google Security, and it leaks information from any applications and services utilizing OpenSSL. The problem, however, is not that it was found; the problem is that over two-thirds of the entire Internet contains sites that utilize the OpenSSL/TLS protocol specification. It also doesn't help that this bug has been active since December of 2012.
Admit it, you've thought about moving some of your computing infrastructure to the cloud, but just couldn't take the leap because there is a perception out there that suggests cloud-based computing systems are less secure than the ones that you house within the confines of your office. The fact of the matter is that every piece of computing infrastructure has the same shortcomings as far as security goes. Whether hosted in a cloud or in an enterprise data server, the thing that makes data security work for business is having the right people managing your information.