These last posts covered a lot of ground: cyber security, data breaches, email security, cloud computing, and we only scratched the surface of each topic. Based on just this cursory overview, you should be doing the following: Securing your equipment and network Backing up your data. Talking to any service providers you use, such as credit card processors, and finding out what they’re doing to secure your transactions and data. Reviewing (or creating) your policies on Permitted software Passwords Who should access the company’s network and devices Working at remote locations Physically...

Overview of the cloud You hear it everywhere: “The data is stored in the cloud.” “Run our app in the cloud.” “Upload that to the cloud.” Cloud this, about that, cloud bank (okay, I made up that last one). You have a vague sense of what everyone means by “the cloud”, but you don’t know exactly what it is. Except you think it has something to do with the Internet. You’re on the right track. In fact, speaking in broad terms, the “cloud” is the Internet. For example, let’s say you upload some data to a “cloud service.” The data moves through the Internet to servers...

A Charlotte law firm received a ransom demand. But the ransom wasn’t for the release of a kidnapping victim. The law firm would have to pay for the release of its file server. You see, hackers scrambled the server and encrypted the data. The hackers then demanded the law firm pay for the encryption key. A different Charlotte law firm transferred $38,000 to a Virginia Beach bank. Cybercriminals intercepted the transfer and eventually routed the funds to a bank in Moscow. In both cases, you might think, the hackers worked their way through the Internet and kept testing the firms’ security,...

You know that feeling of dread you get when you realize you just deleted a file or program critical to your business? That client list, tax return, report code? Everyone knows that feeling. Over the last 10+ years we have helped many companies: large and small, in Miami, Charlotte and elsewhere, who experienced a critical data loss. In the majority of cases an employee was the root of the problem, and in some cases production came to halt until someone fixed the error. Data Security Best Practices We tend to think of cyber-security as protecting our company against the iconic “hacker”...

Foodie-Call.com, a Charlotte, NC small business, suffered a data breach twice in 2014. Owner Anu Mehra was left with the bill for $10,000 in fraudulent transactions, and may lose her business if hackers strike again. She told WSOC-TV: “I’m a local business owner. I don’t have partners. I don’t have a franchise. There’s no deep pockets for me to go to and have some help with this.” According to the North Carolina Attorney General’s office, 2014 saw 17 reported data breaches in Charlotte, affecting 3,370 persons. The Charlotte metro area saw an additional 14 data breaches...