All posts by Reed Hallowell

Security Tip of the Week!

By

Not All Data is Created Equal    In the ever increasing world of cyber crime not all data is created equal, and thus, not all data should be stored the same. Data that can be converted into currency in any way is what hackers are after; we call this toxic data. According to a Forrester article, “Attackers won’t steal data they can’t sell in the market for stolen data like credit cards, credit reports, certain types of IP, and personally identifiable data.” But don’t be fooled by what people tell you is not important data, because often times it can be.… Read more ›

Top 3 Security Threats of 2014

By

     1. BYOD Trends In The Workplace We can’t ignore it anymore; the BYOD trend is booming and cannot be stopped.  Employees in 2014 seem to like using their own customized personal device, which makes sense because it’s easier to use and increases productivity as well as efficiency. A lot of employees don’t know it yet but bringing their own mobile devices into the workplace causes a lot of issues with the risk of data breaches and being exploited. The risk associated with bringing in a device varies and is explained well by Steve Durbin of Computer Weekly stating, “These… Read more ›

Wealth And Innovation Beware

By

“Their impact is tremendous, in the hundreds of millions of dollars from small business, mom and pop operations, who lose their very existence to a financial crime.” Don Johnson, Associated Press. International cyber crime organizations targeting well to do enterprises are on the rise in the United States. Specifically, cyber gangs seem to be targeting California businesses and financial institutions. A report made by Attorney General Kamala Harris says, “California is a global leader on a number of fronts and, unfortunately, transitional criminal activity is one of them.” Experts think that the up rise in cyber crime in California is… Read more ›

Security Tip Of The Week!

By

Tip #6: Don’t Ignore The Updates! Are you ever up late watching Netflix and that little update box pops up and interrupts your show?  You probably do what I do and close or postpone the update until a better time. But for some people that better time never seems to come. This, my friends, is called a computer’s slow death. The only way to avoid this is to make sure to keep up with updating your computer. One way that can help people who don’t want to deal with the hassle is setting up an automatic update, it works well… Read more ›

The Harsh Reality About Data Breach Clean Up

By

There is much more involved in a data breach than just losing valuable information. Now, don’t get me wrong, a breach can cost millions solely due to the information stolen, but this is often times covered by insurance and is just the tip of the ice burg. The clean up is where it really begins. What to Expect During Clean Up 1. You may need to hire an outside company to investigate the data breach internally, it’s not good press to let the hacker get away cleanly and lose all your hard earned customers. 2. If your customers money is… Read more ›

Security Tip of the Week!

By

  Tip #5: Multi-Factor Authentication The security tip of the week this week focuses on multi-factor authentication and how it can help you add extra security to access points on electronic devices. A single authentication is considered to be something that only the user should know (e.g. password, PIN, a specific pattern) but is often not secure enough if the user is attempting to access confidential data on the device. It is important to check which level of authentication is best for you because authentication methods that depend on more than one factor are more difficult to compromise than a… Read more ›

nCrypted Cloud is Heading to the 2014 RSA Conference!

By

The 2014 RSA Conference is being held February 24-28 at the Moscone Center in San Francisco and nCrypted Cloud will be there! The RSA Conference focuses on cryptography and information security and brings together hundreds of companies that are in the security, compliance, and risk-management solutions industries. The conference is used to announce new products, network companies, bring in potential investors and helps drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. nCrypted Cloud is going to announce an exciting new partnership at the RSA conference this year, so stay tuned…

Security Tip of the Week!

By

Tip #4: Make Sure to Back Up Data on your Computer Regularly! The Break Down This may seem like another obvious tip but a majority of computer users do not back up their data regularly. If data is not backed up it can be lost instantly, whether it be a fire, flood, your computer is stolen, or it just simply breaks down. People often lose their data because they choose not to. According to Backblaze.com, “56 percent of our customers said they started backing up as a result of themselves or a friend losing data.” Don’t be this person! It’s… Read more ›

Workplace Collaboration In The Digital World

By

Workplace Collaboration There is no denying it, collaboration within the enterprise exists and cannot be ignored. According to a recent Forrester article on collaboration: Today, 97% of information workers regularly communicate or collaborate with others in their company as a part of their day-to-day job 76% say the same when it comes to contact with customers or clients, 64% do so with suppliers, vendors, and partners. This number may seem meaningless to most, but confidential data gets sent improperly everyday throughout companies. Forrester created a poll of the typical collaboration occurring within the workplace which best illustrates the vastness: This graph clearly shows… Read more ›

Security Tip of the Week!

By

Tip #3: Be Careful What Network You Join! • Avoid doing anything confidential on a public network; this includes airports, coffee shops, and fast food restaurants. The reason for this is you have no administration over the computer, so you have no idea who has access to your information. • Because of the lack of security on open networks, hackers can actually scan the plaintext traffic from the network used and can analyze and steal your passwords. • Some scammers will actually set up a fake “Free Wifi” network in order to draw people into their networks and will then… Read more ›