Blog
The Most Important Small Business Checklist of the Year
By Christopher George 2019 goals, contain attacks
As you begin to establish goals and reevaluate critical business risks for the year ahead, cybersecurity must be at the very top of your list. According to the Breach Level Index, the number of lost, stolen or compromised records increased by a jaw-dropping 133% in the first half of 2018 compared to the same time the previous year. As attack methods continue to evolve, you not only need a strong security platform, but the knowledge and experience to put it all together. Without the right...
7 Lesser-Known Security Tips for Your New Device
By Christopher George antivirus software, automatic updates, computer security, device features
Hoping to find a new laptop, tablet, smartphone or other device under the tree? Every time you use technology, whether at work or at home, you are sharing personal identifiable information (PII). With any new device, you must take precautions to ensure safe processing and storage of this data. Without a proactive-security approach to defend against hackers and identity thieves, you are setting yourself up for an unhappy 2019. Antivirus software, using strong passwords and changing them...
What You Need to Know About Bot-driven Attacks This Holiday Season
By Christopher George bot-driven attacks, cloud backup, cloud dr, cloud services, cybersecurity, ecommerce security
Excited for the holidays to get underway? So are hackers. Online retail transactions are 10 times more likely to be fraudulent than even those of the financial services sector, according to the Threat Metrix Q1 2018 Cybercrime Report. With the busiest shopping season of the year less than a week away, cybercriminals are taking every advantage with bot-driven attacks, one of the most dangerous threats of today. Ecommerce companies are currently the prime target, but do not fool yourself into...
4 Action Items for National Cyber Security Awareness Month
By Christopher George cloud backup, cloud storage, clouddr, disaster recover, duo security
From election interference allegations and natural disasters to topics like cloud-service misconfigurations and API vulnerabilities the industry has been experiencing over the last couple of months, no one is immune to data breaches. Your systems and data are a constant target for hackers on the hunt. In fact, according to the Verizon 2018 Data Breach Investigation Report, a whopping 58% of cyber-attack victims were classified as small businesses. As part of this October’s National Cyber...
Top 4 Cybersecurity Tips for Successful Cloud Computing
By Christopher George apis, best practices, cloud computing, end-to-end encryption
The security hits keep coming from all directions, and misconfigurations in third-party Application Programming Interfaces (API) are quickly becoming one of the fastest-growing vulnerabilities for malicious activity. These kinds of problems reinforce just how critical it is to never assume Software as a Service (SaaS) or cloud service providers have the proper security in place to protect your information. In order to fully grasp the magnitude of how dangerous these threats are, it is important...
The 1 Thing You Need Most When Converting to the Cloud
By Christopher George cloud conversion, cloud storage, cyber-threat, data security
In today’s cyber-threat landscape, there is no room for human error when setting up your cloud systems. Whether you have an internal IT team or an outside service provider, cloud conversion isn’t something just anyone can do. The latest misconfiguration mishaps with Amazon Web Services (AWS) Server buckets being set to allow anyone in the public to access confidential information is nothing short of an invitation for malicious activity. These completely avoidable mistakes underline the...
3 Tactics to Boost Your Confidence in Adopting New Technologies
By Christopher George business growth
Adopting new technologies is crucial to business growth; yet, worries about how to properly secure it are keeping small and medium-sized business owners from making this important investment, according to a recent Forrester Research study commissioned by the Columbus Collaboratory. In fact, 56% of business owners surveyed indicated that securing hybrid cloud technology caused them high or very high anxiety. This lack of confidence often leads to other issues, such as slow or unfinished...
How to Prepare for GDPR – A CISO’s Perspective
By Christopher George compliance
The General Data Privacy Regulation (GDPR) will come into force on May 25, 2018. This regulation requires companies in all countries who perform payment-card transactions with any citizen of the European Union (EU) to maintain a stringent plan that protects their personal data and privacy. Without the required security tools, controls and documentation in place, failure to comply with GDPR could potentially cost you millions. That’s where Protelligent®, in partnership with AlienVault®, can...
What You Need to Know about PCI DSS 3.2
The Payment Card Industry Data Security Standard (PCI DSS) published by the Payment Card Industry Security Standards Council (PCS SSC) is a set of regulations businesses must use to safeguard the financial and personal data of their customers throughout every point of a transaction. In response to the increase in payment information threats, version 3.2 of the PCI DSS is in full effect. PCI DSS is now recognized as a standard that can be updated with small revisions, rather than only when...
Protelligent Ensures Compliance with Duo Security
By Christopher George Community, data access, duo security
Duo Security knows security and compliance are crucial to ensuring the success of their customers. Their security expertise includes compliance, two-factor authentication and endpoint remediation that provides their customers with the tools they need to ensure they adhere to the latest in compliance standards. Protelligent® recognizes the importance of ensuring compliance, and has chosen to partner with Duo Security to provide solutions to our customers. Through Protelligent’s use of Duo...
Recent Posts
Archives
- August 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (1)
- February 2020 (1)
- January 2020 (1)
- December 2019 (1)
- November 2019 (1)
- October 2019 (1)
- September 2019 (2)
- July 2019 (1)
- June 2019 (3)
- April 2019 (1)
- March 2019 (1)
- February 2019 (1)
- January 2019 (1)
- December 2018 (1)
- November 2018 (1)
- October 2018 (1)
- September 2018 (1)
- August 2018 (1)
- May 2018 (1)
- March 2018 (1)
- February 2018 (1)
- January 2018 (2)
- December 2017 (2)
- November 2017 (3)
- October 2017 (3)
- September 2017 (2)
- August 2017 (3)
- July 2017 (2)
- June 2017 (5)
- May 2017 (7)
- April 2017 (5)
- March 2017 (5)
- February 2017 (1)
- January 2017 (5)
- December 2016 (1)
- October 2016 (4)
- September 2016 (1)
- August 2016 (3)
- July 2016 (1)
- June 2016 (1)
- May 2016 (1)
- April 2016 (1)
- November 2014 (1)
- July 2014 (2)
- June 2014 (1)
- May 2014 (3)
- April 2014 (3)
- March 2014 (1)
- February 2014 (2)
- January 2014 (3)
- December 2013 (1)
- November 2013 (4)
Categories
- Community (19)
- Cloud (18)
- IT (16)
- cloud backup (16)
- cybersecurity (15)
- cloud backup data recovery (9)
- cloud computing (8)
- clouddr (8)
- it security (8)
- cloud storage (7)
- data security (7)
- AWS (6)
- Education (6)
- cloud services (6)
- Giving Back (3)
- cloud restoration (3)
- compliance (3)
- data (3)
- assessment (2)
- business (2)
- chief information officer (2)
- client satisfaction (2)
- cloud data recover (2)
- cloud dr (2)
- critical power exchange (2)
- cyber (2)
- cyber responsibility (2)
- data recover (2)
- datacenter (2)
- duo security (2)
- end-to-end encryption (2)
- hackers (2)
- holiday season (2)
- internet (2)
- storage (2)
- 2019 goals (1)
- Android (1)
- Arts (1)
- Business Continuity (1)
- CASBO (1)
- Cisco Cloud Web Security (1)
- Cisco Security Intelligence Operations (1)
- Custom Design (1)
- Graphics (1)
- Protelligent (1)
- Virus (1)
- account protection (1)
- advanced persistent threats (1)
- alien vault technology (1)
- alienvault technology (1)
- antivirus program (1)
- antivirus software (1)
- apis (1)
- apt (1)
- attachment (1)
- attack (1)
- automatic updates (1)
- awareness (1)
- backup (1)
- benefits (1)
- best practices (1)
- bot-driven attacks (1)
- bring your own device (1)
- bug (1)
- business growth (1)
- byod (1)
- california joint powers insurance authority (1)
- california jpia (1)
- check cashing (1)
- cisco (1)
- cjpia (1)
- client testimonial (1)
- cloud backup vs cloud storage (1)
- cloud computing services (1)
- cloud conversion (1)
- cloud migration (1)
- cloud recovery (1)
- community link consulting (1)
- compliance program (1)
- compliance regulations (1)
- computer science (1)
- computer security (1)
- computers (1)
- contain attacks (1)
- cost of cybercrime (1)
- cost of data breach study (1)
- critical power (1)
- critical power products & services (1)
- customer testimonial (1)
- customer testimonial video (1)
- cyber liability (1)
- cyber-threat (1)
- cybercrimes (1)
- cybercriminals (1)
- cybersecurity program (1)
- data access (1)
- data breach (1)
- data breach protection (1)
- data center (1)
- data encryption (1)