Locking Down Sensitive Data in Business Laptops

Locking Down Sensitive Data in Business Laptops

What constitutes sensitive data these days? Due to the increased threat of data breaches, identity theft, and cyber attacks, the definition of sensitive data has been expanded to include just about any type of digital information that is routinely stored in a business laptop. Protecting Private Information on Business Networks From personally identifying information to…

Details
Cloud Computing Considerations for High Desert Law Firms

Cloud Computing Considerations for High Desert Law Firms

Scalability, cost-efficiency, mobility, and paperless work ethics are some of the main advantages of the cloud computing solutions that are increasingly being adopted by business owners across the United States. According to July 2017 statistics cited by renowned law firm Bryan Cave LLP, 95 percent of American enterprises are using some sort of cloud service,…

Details
When Subtitles Attack New Cyber Risk in the High Desert

When Subtitles Attack: New Cyber Risk in the High Desert

If you own a business in Victorville, Apple Valley, Hesperia, or elsewhere in the High Desert, you should know that web browsing by your staff is among the most common causes of virus infections, data breaches, and compromised networks. Firewalls and security software can only do so much to keep business networks safe; to prevent…

Details
The Danger of the Leaked NSA and CIA Hacking Tools

The Danger of the Leaked NSA and CIA Hacking Tools

In terms of security, the year 2017 is shaping up to be one of the most challenging and hazardous for users of enterprise networks. From booby-trapped Microsoft Word documents to highly technical leaks of exploits used by United States intelligence and espionage communities, the information security (infosec) threat environment has been at historically elevated levels…

Details
Modern Point-of-Sale Solutions in the High Desert

Modern Point-of-Sale Solutions in the High Desert

The retail, restaurant, and hospitality sectors have been thoroughly transformed by point-of-sale (POS) systems, which have come a long way since IBM developed mainframe computers that could be operated by means of ancillary or remote clients known as electronic cash registers in the mid-1970s. The History of Point-of-Sale Systems In the United States, Dillard’s and…

Details
Cloudbleed A Potential Risk for High Desert Business Owners

Cloudbleed: A Potential Risk for High Desert Business Owners

Cloudbleed, the first major internet vulnerability of 2017, was announced by cyber security analysts in mid-February. It took less than two weeks for analysts to determine that this particular problem could affect millions of internet users around the world; in terms of potential damage to High Desert companies, business owners who are Cloudflare clients should…

Details
Why Private Cloud Solutions Make Sense for 2017

Why Private Cloud Solutions Make Sense for 2017

Information security analysts will likely remember 2016 as a year of spectacular cybercrime events, particularly data breaches involving major organizations and even providers of cloud computing services. Yahoo, Wendy’s, LinkedIn, Oracle, Dropbox, and the University of Central Florida were some of the biggest targets of data breach attacks in 2016. Cyber Security Issues Against Cloud…

Details
another-california-health-system-targeted-by-ransomware

Another California Health System Targeted by Ransomware

Six months after hackers infected Victorville’s Desert Valley Hospital with malware specifically coded and deployed for extortion purposes, a major medical billing firm suffered a similar attack and lost a substantial amount of patient data. How Do Malicious Threats Attack Systems Apparently, an unsuspecting MMPC employee either opened an email attachment or clicked on a…

Details