Skip to main content
Free Security Computer Science photo and picture
Cybersecurity

Data Backup Is Not Enough, You Also Need Data Protection

The need to back up data has been around since floppy disks. Data loss happens due to viruses, hard drive crashes, and other mishaps. Most people using any type of technology have experienced data loss at least once.There are about 140,000 hard drive crashes in the US weekly. Every five years, 20% of SMBs suffer data loss due to a major disaster. This has helped to drive a robust cloud backup market that continues to grow.But one thing that’s changed with data backup in the last few years is security. Simply backing up data so you don’t lose it, isn’t enough anymore. Backing up has morphed into data protection.What does this mean?It means that backups need more cybersecurity protection. They face threats such as sleeper ransomware and supply chain attacks. Cloud-based backup has the benefit of being convenient, accessible, and effective. But there is also a need for certain security considerations with an online service.Companies need to consider data protection when planning a backup and…
Nicholas Salem
April 15, 2023
Outreach

Why BMIT Has Decided to Leave Twitter

BMIT is a leading managed IT service provider that helps businesses grow smarter through strategic technology. We have been using Twitter as one of our social media platforms to connect with our customers, partners, and industry peers. However, we have recently decided to leave Twitter and focus on other communication channels. Here are some of the reasons why: Twitter has become increasingly toxic and divisive. We value civil and respectful dialogue, but we have witnessed too many instances of harassment, abuse, misinformation, and hate speech on Twitter. These are not aligned with our core values and mission. Twitter has failed to protect its users' privacy and security. We take data protection very seriously, but we have seen numerous reports of data breaches, hacks, leaks, and unauthorized access on Twitter. These pose significant risks to our customers and our own confidential information. Twitter has not delivered on its promises of engagement and reach. We have invested time and resources to create quality content and interact with…
Nicholas Salem
April 10, 2023
person using MacBook Pro
Business

8 Reasons Every Company Is Now a Technology Company

Whether you sell shoes or run an accounting firm, you need some type of technology to operate. Today’s companies aren’t just in the business of selling their own goods and services anymore. They also must master various types of digital tools.These include software, payment systems, computers, Wi-Fi networks, mobile devices, and more. Companies also need to protect their devices and network.. If that technology isn’t working, it can impact a business significantly.98% of surveyed organizations say that just one hour of IT downtime costs more than $100,000. The reliance on technology means that every company is now a technology company.This is the case no matter what products you sell or services you provide. Let’s discuss exactly why this is the case in today’s world.What Makes Technology a Backbone of Any Business?1. Technology Is a Critical Part of BusinessEven farmers use tech to check commodity prices, sell livestock, and keep their books. Most companies couldn’t operate without their software. Or without databases filled with important information.IT…
Nicholas Salem
April 10, 2023
Free Shinjuku Ward Building photo and picture
Cybersecurity

Is That Really a Text from Your CEO… or Is It a Scam?

Imagine you’re going about your day when suddenly you receive a text from the CEO. The head of the company is asking for your help. They’re out doing customer visits and someone else dropped the ball in providing gift cards. The CEO needs you to buy six $200 gift cards and text the information right away.The message sender promises to reimburse you before the end of the day. Oh, and by the way, you won’t be able to reach them by phone for the next two hours because they’ll be in meetings. One last thing, this is a high priority. They need those gift cards urgently.Would this kind of request make you pause and wonder? Or would you quickly pull out your credit card to do as the message asked?A surprising number of employees fall for this gift card scam. There are also many variations. Such as your boss being stuck without gas or some other dire situation that only you can help with.This scam…
Nicholas Salem
March 31, 2023
Free Lock Padlock illustration and picture
Cybersecurity

6 Ways to Prevent Misconfiguration (the Main Cause of Cloud Breaches)

Misconfiguration of cloud solutions is often overlooked when companies plan cybersecurity strategies. Cloud apps are typically quick and easy to sign up for. The user often assumes that they don't need to worry about security because it's handled.This is an incorrect assumption because cloud security is a shared model. The provider of the solution handles securing the backend infrastructure. But the user is responsible for configuring security settings in their account properly.The problem with misconfiguration is huge. It’s the number one cause of cloud data breaches. It’s also an unforced error. Misconfiguration means that a company has made a mistake. It hasn't adequately secured its cloud application.Perhaps they gave too many employees administrative privileges. Or, they may have neglected to turn on a security function. One that prevented the downloading of cloud files by an unauthorized user.Misconfiguration covers a wide range of negligent behavior. It all has to do with cloud security settings and practices. A finding in The State of Cloud Security 2021 report…
Nicholas Salem
March 25, 2023
Cyber Security

Written Information Security Program (WISP) – What is it? Do I need it?

Massachusetts data security regulations went into effect in 2010 requiring every company that owns or licenses “personal information” about Massachusetts residents to develop, implement, and maintain a Written Information Security Program known as a WISP. Your WISP must contain certain minimum administrative, technical, and physical safeguards to protect “personal information”. Despite this requirement, many companies, particularly those not physically located in Massachusetts, have not done so. Historically, the absence of a WISP is something that went unnoticed, but that may no longer be the case due to a recent change in the Massachusetts breach notification law. Massachusetts has amended its data breach notification law to require organizations that experience a data security incident to notify the Massachusetts Attorney General and the Massachusetts Director of Consumer Affairs & Business Regulation whether the organization implemented a WISP. This new reporting requirement highlights both the legal and practical need to implement a WISP. What changed? Jason Wong @jasonhk1920 Effective as of April 11, 2019, organizations that experience a…
Nicholas Salem
March 20, 2023
Free Online Banking Banking Operations illustration and picture
Cybersecurity

Smart Tips to Stop Money From Being Stolen Through Online Banking

There are a lot of things that have changed since the invention of the internet. One of these is how we bank and access our accounts. You used to have to go into a local bank branch to make deposits and withdrawals. Now, you can take a picture of a check and deposit it from your phone.Approximately 73% of people around the world use some form of online banking at least once a month. People have never had such convenient account access. But that convenience can come at a cost.In 2021, account takeover fraud increased by 90%. New account fraud jumped a whopping 109%. As the ease of online banking has increased, so has banking-related cybercrime.If someone breaches your Facebook account, it can be a real pain. But, if a hacker breaches your bank account, it can be devastating. It can mean significant losses. Losses that you may not be able to recoup from your financial institution.In this article, we’ll take a look at the…
Nicholas Salem
March 15, 2023