Monthly Archives

November 2018

DOES YOUR COMPANY HAVE A BACKUP PLAN?

By | News
Does your company have a backup plan to keep operations from falling apart in an emergency?
A business emergency is one of those things you never want to think about – until you have to. Weather emergencies. Natural disasters. The loss of a revenue stream.
A healthy fear is a strong motivator for many business owners to take action and protect both their businesses and their team.https://elbo.in/NEze

IoT DISRUPTION HAS BEGUN. WHEN WILL YOUR COMPANY BE AFFECTED?

By | News
IoT disruption has begun and retail is just the start. When will your company be affected?
We consumers live in a connected world, so the companies we deal with have good reason to live in that world with us.
#IoT connectivity will soon become the standard across the finance, healthcare, and automotive industries. Here’s how your business will be affected. https://elbo.in/s5US

PROTECT YOURSELF FROM A CYBERATTACK THIS HOLIDAY SEASON

By | News
Most people worry about online shopping scams, but few take active steps to protect themselves.
Online shopping dominated this past Black Friday, and Cyber Monday became the single biggest sales day in U.S. history, pulling in $7.9 billion.
No question about it: we are addicted to shopping while sitting on the couch. Here’s what you can do to protect yourself from a cyber attack this holiday season. https://elbo.in/sQ98

What is a Vulnerability Scan?

By | Blog

The word cyberattack has virtually become a household term thanks in part to high-profile attacks in recent years. Mention a company name like Equifax or Ashley Madison and it will likely conjure up very different thoughts than they would have just a few short years ago. These type attacks have impacted millions of consumers and businesses forcing the need (and responsibility) to protect your important data.

A vulnerability scan is a technique used to identify security weaknesses in a computer system. Security weaknesses are what cybercriminals look for to gain unauthorized access to a network resulting in…. you guessed it, a cyberattack. I could get all technical and start talking about ports, patches, and the Heartbleed bug, but similar to my other blogs my intention is to bring awareness to these terms in a non-technical way.

A vulnerability scan is performed using software which upon completion produces a report that lists out found vulnerabilities and (depending on the software) will give an indication of the severity of the vulnerability and basic remediation steps. Performing these scans with routine is a widely recognized security best practice among large corporations, however, small and medium-sized businesses often believe they don’t have the resources or the budget for this security technology. You should know there are free scanners available, as well as, free trial software which can be used to test your network. Although there are free options, it is relatively inexpensive to pay a professional to perform one for you.

I’ll leave you with this final thought. Since there is free software available to scan for vulnerabilities, what do you think “the bad guys” are doing with it? You guessed it, using it to find companies who have obvious vulnerabilities they can exploit. This brings to mind a well-known saying: “You don’t have to run faster than the bear to get away. You just have to run faster than the guy next to you”. You don’t need to have the best security, just don’t have the worst.

Next up: What is pen testing?

Click here for our previous post, “What is a Hosted PBX?”

So, what is 5G?

By | Resource Center
So, what is 5G? You have probably heard this whispered around the office recently but do you know how it will affect you and your business?
5G networks are the next generation of mobile internet connectivity, offering faster speeds and more reliable connections on smartphones and other devices than ever before.https://elbo.in/ZcE9