I-BN Blog

Cybersecurity - What an Employee Should Do After Being Hacked

Published on Feb 26, 2020 7:20:07 AM

If you realize that your e-mail or computer is compromised what should you do?  STOP doing anything!

Your company may have specific guidelines and if so, contact the point person within your organization.  If not some simple guidelines are:

  1. Turn off the computer
  2. Contact your IT department, help desk, managed service provider or whomever is responsible within your company.
  3. When you or your help desk turn it back on make certain it is not attached to any network.  Unplug the network cable, put it in plane mode, keep it disconnected from anything it could infect
Read More

Topics: Cyber Security


Cybersecurity Guidelines from the Employee Perspective

Published on Dec 17, 2019 10:53:00 AM

Cybersecurity includes the processes, procedures and technology used by companies and their employees to protect the computer networks, equipment and data from unauthorized access, use, modification, theft or destruction.  Protecting these “digital assets” has become an urgent priority for all companies to maintain the trust of their customers, compliance with contracts or laws and even its survival from an attack.

Read More

Topics: Cyber Security


Cybersecurity Guidelines for Your Employees

Published on Dec 10, 2019 9:59:00 PM

Cyber attacks use malicious code such as viruses and ransomware to modify computer code, data,or logic culminating into destructive consequences that can compromise your data and business. No amount of physical protections or software tools can provide 100% security for your computers and network. Most security experts also agree that the biggest risks are your users, and educating them will be the most important aspect.  Your goal is to reduce the risk of and from attack to the greatest extent possible, and educating your employees may be the most effective method for mitigating risk.

Read More

Topics: Cyber Security


Cybersecutiry Tools for Protecting Your Company

Published on Dec 2, 2019 9:33:00 AM

Cyber attacks use malicious code such as viruses and ransomware to modify computer code, data,or logic culminating into destructive consequences that can compromise your data and business. No amount of physical protections or software tools can provide 100% security for your computers and network. Your goal is to reduce the risk of and from attack to the greatest extent possible using tools and procedures.

Read More

Topics: Cyber Security


Cybersecurity - The 21st Century Business Challenge

Published on Nov 21, 2019 9:53:00 AM

 

A cyber-attack is an intentional exploitation of computer systems, networks, and software. These attacks use malicious code such as viruses and ransomware to modify computer code, data, or logic culminating into destructive consequences that can compromise your data and business. Do not think this will not happen to you! According to a 2017 Poneman study 61% of small to mid-sized businesses (SMB) were breached in 2017 in one form or another. Securing your business is not an IT job, it needs to be a responsibility of any employee, contractor or consultant who has access to your business information.

Read More

Topics: Cyber Security


Cyber Security – Risk and Survival

Published on Sep 27, 2018 10:41:24 AM

As a small business owner or a mid-sized business manager you already have enough on your plate to have to deal with cyber security issues. Unfortunately, recent statistics show that 61% of small and medium sized businesses suffered a Cyber Attack in 2017, up from 55% in 2016 according to the Ponemon Institute. The same report noted that the average cost due to damage or theft of IT assets and infrastructure increased from $879,582 to $1,027,053. The average cost due to disruption to normal operations increased from $955,429 to $1,207,965.

Read More

Topics: digital transformation, Cyber Security


New Call-to-action

Recent Posts

Posts by Topic

see all