What is TikTok for Business? TikTok is extraordinarily popular, with the projected number of users in the United States in 2023 to be 97.6 million.1 Given this popularity, businesses may wonder if they should consider utilizing this platform for business outreach and branding. Given security concerns, businesses may also wonder if they should consider avoiding […]
Category: IT Security
Secure Email Servers
What are Secure Email Servers? An email server is a computer system that handles the delivery of email over a network. With a significant percentage of cyberattacks originating in emails, it is critical that email servers are configured securely. The following are tips for ensuring that your email server is configured to offer your organization […]
What is Remote Monitoring and Management Software Security? Remote monitoring and management (RMM) software is a type of application often used by managed service providers as a tool to help them maintain their clients’ IT systems and infrastructure. A small footprint, often called an “agent,” is installed on client workstations, servers, mobile devices, and other […]
Database Security
What is Database Security? Database security refers to all of the measures taken to prevent breaches into database management systems (DBMS), and all associated software. Databases are often full of sensitive and confidential information, so protecting database contents is a critical cybersecurity objective. The following are best practices for protecting DBMS: Control database access. Follow […]
What are Continuing Cybersecurity Threats? Cybersecurity vulnerabilities in Google and Microsoft products are addressed quickly after they are discovered, but in the cases of the following vulnerabilities, cyberattackers have continued to find ways to carry out their attacks. Being aware of these continued threats will help you to protect yourself from cyberattacks by employing the […]
What is Patching and Updating? Patch management is the process of distributing and applying updates to software and the operating system that address security vulnerabilities within products and programs. Areas that commonly need patches include operating systems, applications, and embedded systems, such as network equipment. The following is the process used for creating software patches: […]
SIM-Swapping Attack
What is a SIM-Swapping Attack? SIM swapping, sometimes called SIM hijacking, occurs when a device tied to a customer’s phone number is fraudulently manipulated. Cyberattackers usually employ SIM swapping as a way to receive one-time security codes from banks, cryptocurrency exchanges, and other financial institutions. A study by Princeton University found that four-fifths of SIM-swap […]
Confidential Computing
What is Confidential Computing? Confidential computing refers to cloud computing technology that can isolate data within a protected central processing unit (CPU) while it is being processed. The contents of this protected environment include the data being processed and the techniques used to process it; these contents are accessible only to authorized programming code, and […]
Telework Tips
What are Tips for Telework? The Computer Security Resource Center (CSRC) at the National Institute of Standards and Technology (NIST) provides a number of tips for employers and employees to consider as they embark on telework.1 Tips for Employers National Checklist Program (NCP). NIST maintains a publicly available National Checklist Repository that contains a variety […]
Network Outages
What are Network Outages? The experience of a network outage can range from brief and mildly disruptive to catastrophic. Research into unplanned outages at 63 data centers by the Ponemon Institute found that the average cost of an unplanned outage, per minute, is nearly $9,000 per incident.1 Without knowing the extent of what damage a […]