A supply chain attack is a form of cyber attack where cyber criminals get into the networks of a technology supplier and then steal their customers’ data or release malware that impacts those customers. Supply chain attacks are a huge risk today. Just think of your own company. You undoubtedly work with tens of suppliers […]
Author Archives: B-Comp Services
If you’re thinking about getting cyber liability insurance, read this article first. There have been some considerable changes in the cyber insurance market, which mean that it might not make sense for many SMBs to purchase – or even renew – their coverage. Let’s take a look. Definition: Cyber insurance Before we dive in, let’s […]
Auditing your privileged accounts might not seem like a big deal. After all, your privileged account users know what they’re doing, right? These are users like IT guys and system administrators who have administrative privileges in your systems. Usually, privileged accounts have total access to your files and data and can make big changes to […]
There comes a time when every corporate laptop reaches the end of its life. If your computer has stopped working altogether, it can be tempting to throw it in the trash can, but this is a huge security risk. The Identity Theft Resource Center reported 78 data compromises in 2020 relating to “physical attacks”. 52% of these attacks occurred […]
Hearing the terms Microsoft and security weakness in the same sentence is enough to send anyone into a slight panic. Across the world, Microsoft software is the backbone of corporate communications and collaborations. Like all companies, though, Microsoft is vulnerable to data breaches and the company’s people – like all humans – can make mistakes, […]
Phishing remains a constant threat for any size company. It’s the main method of attack delivery because it’s so effective. Unsuspecting users can be tricked in multiple ways to click a dangerous link or open a malicious file attachment, and tactics continue to evolve. As soon as you train employees on the latest phishing tactics […]
There are many different types of cyberattacks out there that can disrupt your business operations. There is ransomware, cloud account takeover, business email compromise, distributed denial-of-service attacks (DDoS), and many others. One of the most far-reaching is a DDoS attack because it involves taking a web-accessed site or system completely offline for those trying to […]
One of the big benefits of a laptop computer is the ability to use it for several hours without needing to be connected to a power outlet. This allows you to work in places like an airplane, out on the back patio, or from your vehicle. Today’s laptops have varying capacities for holding a battery […]
It’s important to have a budget in place for your IT expenditures. Otherwise, costs can easily get out of hand, and you end up paying more than you expected. For example, if you don’t do your research and have a set budget for your cloud expenses, SaaS spending can easily get unruly, especially if employees […]
Remote workers have become a normal part of a company’s workforce since the pandemic changed the way we live and work. Before the pandemic, just 24% of the U.S. workforce worked from home three or more days per week, and 47% never worked from home before. After the pandemic, 53% of workers are working from […]