The risks and rewards of using SIEM for small businesses

Large corporations are often believed to be the main targets of cybercriminals, but the truth is far more disturbing. Small Business Trends reported that 43% of cyberattacks actually target small businesses, and only 14% believe that they can effectively deal with these attacks.

Threats darken cloud services

The clouds that tickle our imagination come in many shapes and sizes, and are unreachable. Scientists say that the ones closest to Earth hover at about 6.500 feet. Knowing this, you might think that cloud computing — where personal data is stored and accessed over the internet — is also beyond the reach of others, especially cybercriminals.

Cybercrime bigger than the drug trade

Interview with Capstone IT’s Chief Technology Officer Matt Topper on why small- and medium-sized businesses are more susceptible to online threats

Mention drug lords and the names that come to mind are Joaquín Archivaldo “El Chapo” Guzmán Loera, Pablo “The King of Cocaine” Escobar, and Griselda “The Black Widow” Blanco, among others.

5 Common cybersecurity mistakes that businesses continue to make

With half of the world’s population now having access to the internet, cybercrime has become one of the biggest challenges of modern times. Some estimates put the global cost of cybercrime to $6 trillion dollars per year by 2021. The widespread use of network technologies is fast outpacing our ability to stay secure.

Launch an effective employee cyber-security awareness training to protect your business

Humans are the first and last line of defense when it comes to information security. Technology streamlines work processes and reinforces office policies, but it’s only as effective as your employees are at following and understanding the rules. That’s why compliance regulations place a strong emphasis on the importance of security awareness training.

6 Telltale signs of hacking

In Edgar Allan Poe’s short story "The Tell-Tale Heart," the narrator murders an old man because of his blue “vulture-like” eye and hides the dismembered body under the floorboards of the victim’s home. When the police arrive to investigate, the narrator tells them that the old man went on a trip and shows them the victim’s room.

4 Things you should never do online

Are you sharing your life with over three billion people online? Believe it or not, that’s what most people are doing whenever they use the internet and post something on Facebook, Instagram, Twitter, and other social media sites.

Instead of keeping their personal information safe and secure, many individuals choose to brag about their new car, home, job promotion, and other juicy details that don’t belong next to a friend’s cute cat video.

2018 was a cybersecurity disaster for SMBs— changes to make in 2019

If you’re only vaguely aware of how bad 2018 was in terms of worldwide cybersecurity, let’s recap:

In January, the value of one Bitcoin rocketed to $20,000, providing more incentive for hackers to launch ransomware campaigns (which need untraceable currencies to anonymously collect their bounties).

Also in January, the Meltdown and Spectre vulnerabilities put almost every computer on the planet at risk of a new form of cyberattack.

Warning: Your iPhone’s fingerprint scanner isn’t safe!

Fingerprint sensors have made life easier for smartphone users. With today’s technology, it’s easy to shop for groceries, pay bills, transfer money to a bank, or book a flight to a destination — all with the press of a finger.

But this convenience comes with a price.

NY’s Cybersecurity regulations are unlike anything SMBs have ever encountered

From the European Union’s General Data Protection Regulation (GDPR) to America’s Health Insurance Portability and Accountability Act (HIPAA), government regulations have become the go-to answer for dealing with the epidemic of data breaches. Quietly released by a state government agency in early 2017, one data security framework is about to put all past regulations to shame.

Are you following the backup and disaster recovery best practices?Learn more