By Doug Striker bio You know that old saying, "The only guarantees in life are death and taxes?" To that pithy, depressing phrase, I'd like to add "death, taxes, and phishing." Yes, I believe that phishing is and will be forever a part of our human experience because criminals know we are suckers. And no matter how many people I can train and turn into savvy, … [Read more...] about The Tax Man Emaileth
Information security
The value of your personal information and how to protect it online
Technology makes it easy to connect to the virtual world around you. While an invaluable part of our lifestyle, our connected devices contain enormous amounts of personal data about us, our friends and family. This information—which includes contacts, photos, videos, location, health and financial data—is being collected by advertisers, tech companies and others, and … [Read more...] about The value of your personal information and how to protect it online
How to protect your client data while complying with PCI anti-fraud measures
What would you do if you were asked to install monitoring software on your network? Gary Allen Gardner of Rosi & Gardner, P.C. in Traverse City, Michigan, shares how he resolved a recent troubling request his firm received. We were contacted by our credit card processing company, regarding "PCI Compliance" (Payment Card Industry). By email and subsequent list of … [Read more...] about How to protect your client data while complying with PCI anti-fraud measures
How secure is your password? Are you sure?
Think your password is secure? You may need to think again. People's perceptions of password strength may not always match reality, says a recent study by CyLab, Carnegie Mellon's Security and Privacy Institute. For example, study participants expected ieatkale88 to be roughly as secure as iloveyou88; one said "both are a combination of dictionary words and are appended by … [Read more...] about How secure is your password? Are you sure?
A dozen cybersecurity tips for mobile device users
The vast majority of Americans—95%—now owns a cellphone of some kind, and the percentage of Americans with smartphones has risen to 77%. Navigating the waters of security in the wake of this expansive usage of mobile devices presents serious challenges for families and businesses alike. In recognition of National Cybersecurity Awareness Month, the Illinois Bankers Association, … [Read more...] about A dozen cybersecurity tips for mobile device users
Is a false sense of confidence among your employees exposing your practice to costly phishing emails?
Intermedia, a cloud business applications provider, has released Part 1 of its 2017 Data Vulnerability Report, which examines the security behavioral habits of more than 1,000 office workers in the United States. Your employees are unknowingly granting hackers access Despite organizations educating employees about cyber threats and security best practices, office workers … [Read more...] about Is a false sense of confidence among your employees exposing your practice to costly phishing emails?
Busting 7 common information security myths
Commonly held myths about information security can lead to a potential data breach and ultimately have a big impact on a company's bottom line and reputation. However, these breaches can be avoided when businesses provide their employees with the right training and tools to separate fact from fiction and responsibly manage confidential information. A recent study shows that 23 … [Read more...] about Busting 7 common information security myths
Information Security Checklist for Small Businesses
Why you need this checklist: This checklist, created by Sensei Enterprises, Inc., will help you identify what your cybersecurity program must address. How this checklist helps you: This checklist will help you pinpoint your cybersecurity policy's strengths and weaknesses. How to use this checklist: Print off this checklist and review it with members of your cybersecurity … [Read more...] about Information Security Checklist for Small Businesses
Cyberthreats demand your attention and a customized approach
The recently released BakerHostetler 2017 Data Security Incident Response Report highlights the critical need for senior executives in all industries to understand and be ready to tackle the legal and business risks associated with cyberthreats and to have enterprisewide tactics in place to address intrusions before they happen. At the same time, Dell just released the … [Read more...] about Cyberthreats demand your attention and a customized approach
Keep your firm and yourself cyber safe with some digital spring cleaning
The National Cyber Security Alliance (NCSA) and Better Business Bureau (BBB) are encouraging consumers to get their online lives in good order by conducting a thorough cleanse of their cyber clutter and make "digital spring cleaning" an annual ritual to help protect valuable personal data. A NCSA survey found that preventing identity theft is a top safety concern for Americans, … [Read more...] about Keep your firm and yourself cyber safe with some digital spring cleaning