Entries by John Murray

,

Is your password strong and secure?

A password is more than just an assortment of characters you’re required to enter in order to access your accounts. It is the first line of defense against potential threats and attacks. A weak password makes it easier for hackers or cybercriminals to gain access to your personal information, such as financial details or sensitive […]

How to mitigate remote work security risks

In recent years, remote work has become more popular. While this working arrangement offers many benefits, it also creates numerous security risks. This blog post will provide tips on how to improve your and your employees’ cybersecurity when working remotely. Create clear remote work policies Your company should have clear policies in place that outline […]

FBI Warns of Escalating Elderly Fraud – Here’s What You Need To Know

In America, more than 93,000 people fall victim to financial fraud annually. Whether you are a victim of identity theft, check fraud, email scams, ATM bank card theft, or another form of financial bilking, the results are devastating. For older adults, the devastation is swift and nearly permanent. Unfortunately, as technology advances, the FBI (Federal […]

,

Critical errors to avoid in your business continuity planning

A business continuity plan (BCP) can help your business mitigate the impact of unexpected disruptions such as natural disasters and cyberattacks, and keep your operations running smoothly. However, crafting an effective BCP requires careful consideration and planning. In the following sections, we’ll look at business continuity errors business owners should know and avoid. Incomplete risk […]

,

Managing cloud cyber security

As cloud computing continues to reshape the business world, the need to ensure the security of this complex new environment is more important than ever. This comes with its own significant challenges. Increased cloud adoption is bringing increased exposure to cyber threats, leaving businesses vulnerable to ever-evolving forms of attack. With cyber threats showing no sign of […]

,

Fortifying your business with two-factor authentication and two-step verification

The digital realm is teeming with risks that can compromise business data. Thankfully, a variety of tools and technologies are available for your company to fortify its cybersecurity. Two-factor authentication (2FA) and two-step verification (2SV) are among the most effective methods for bolstering your defenses against attackers. 2FA and 2SV are often used interchangeably, but […]

,

Most consumers can’t spot phishing scams

Some consumers don’t know what the padlock in the browser means Most consumers in the UK wouldn’t be able to spot a phishing website if they ever landed on one, a new report from NordVPN claims. The VPN provider recently ran its National Privacy Test, a global survey on cybersecurity and the public’s awareness of online privacy. […]