Proactive Solutions to Prevent Business Email Compromise

In 2018, 71% of all targeted attacks started with a spear phishing attempt. Spear phishing is a long-used, targeted scam where attackers will research habits, trusted organizations, fellow employees and any other personal information to create an email you are more likely to interact with. A successful phishing attack can lead to ransomware, CEO fraud and even total business compromise. But even the oldest trick in the book can be prevented with proactive security & training.

Read More
Infotect Web Admin
Thinking of Moving to the Cloud? Part 2: Cloud Security

Cloud services have become the next step for those looking for a solution to support their whole infrastructures, without sacrificing speed or space. Read 5 reasons you should move to the cloud today here. The need for comprehensive security in the cloud environment is critical for those who want to ensure their infrastructure against malware and theft. But as with all growing technology, new vulnerabilities are constantly being found and exploited. As more and more businesses turn to cloud applications to support their infrastructure, keeping proactive security strategies will become more important than ever.  

Read More
Infotect Web Admin
Here are the 3 Things You’ll Probably Overlook in Your DR/BC Plan

It’s never too early to start planning for a disaster. In fact, a good disaster preparedness plan should be reviewed and updated continuously, not just in the aftermath of an event. When Irma hit the Florida coast last September, we had our plans. Because of them, we ultimately made it through with little non-repairable damage. That being said, there is always room for improvement and we’ve learned some things that are commonly overlooked when planning that could’ve made a big difference in the time it took to recover from Irma.

Read More
Infotect Web Admin
5 Must-have Security Policies to Implement Today

No business can operate successfully without some policies in place. The purpose of given policies can vary from keeping consistency and accountability for certain actions or jobs, setting expectations of how and when an action should be completed and distributing knowledge consistently among a team or organization. Just like any other part of your business where policies are implemented, technology and security are no different. Often we see evidence that either policies are not being enforced or don’t exist at all. Having good policies in place can mean the difference between a business recovering after an event or attack or not at all.

Read More
Infotect Web Admin
Don’t Get Caught in the Dark by Foreshadow

Just when we all thought that the fallout from the exposure of Spectre and Meltdown earlier this year was almost over, the release of another, related flaw proves just how fundamentally damaging and widespread these types of vulnerabilities are. This newest flaw may prove to be even more far reaching than Spectre and Meltdown, with the ability to affect virtual machines and bypass Intel’s internal software security feature, something that has previous stopped other flaws from being exploited.

Read More
Infotect Web Admin