Were you part of the Equifax Breach?

Data breachMost likely you are part of the breach.  If you were not, then I would still recommend reading this, as you are probably part of another breach.

Equifax has your Social Security Numbers, Birth date, current and past addresses, credit card numbers, and some drivers license numbers.

If this sounds bad, it really is.

What should I do?

(more…)

What is Regulatory Compliance?

Regulatory compliance can take on different definitions according to the industry in which you are applying the policies.  Since compliance means incorporating standards that conform to specific requirements, regulatory compliance is the regulations a company must follow to meet specific requirements.

When you apply regulatory compliance to IT, the regulations apply to two different aspects of company operations which include the internal requirements for IT and compliance standards that are set forth by external entities.  Both types of regulatory compliance affect IT company operations and can potentially restrict (more…)

Network Monitoring Methods

Network monitoring is an essential responsibility for businesses of all sizes.  Medium-sized and large companies typically have a network monitoring system in place either onsite or offsite in the cloud but what about small businesses?  This is exactly what hackers are asking when they are seeking to breach a network.

In the last few years small businesses have become (more…)

Small Business Security – Protecting Information

As many of you have probably noticed, the number of network security breaches in the news has been on the rise.  Some of you are probably thinking “thank goodness I am at a small company”.   The unfortunate truth though is you are just as likely, if not more likely to be a target of online hackers.

As the Wall Street Journal recently pointed out in their July 21st article “Hackers Shift Attacks to Small Firms”, small businesses end up being very lucrative for (more…)