4 Tips for creating a risk-free email policy

4 Tips for creating a risk-free email policy

While social media tends to get most of the attention these days, email remains the preferred way for customers and businesses to keep in touch, and it continues to play a central role in internal communications too. But the sheer popularity of email makes it one of the largest attack surfaces of all.

4 Ways to delete computer files (including one that works!)

4 Ways to delete computer files (including one that works!)

Thinking of selling your old computer or donating it to charity? You may want to get rid of the files on your PC first. There are several ways to do this to keep embarrassing baby pictures, doctored tax account records, or sensitive business data away from prying eyes.

Stay Safe When Shopping Online: Follow These Tips #GetCyberChic

As the holiday season kicks off, shoppers everywhere are more and more frequently opting to use their credit cards from the comfort of their homes, taking advantage of online deals. Since the shopping days known as “Cyber Monday” are upon us, Capstone wants to take a moment and provide some safety tips to our customers (and their own family and friends):

1. Careful with the Clicks
We all receive more email promotions than usual around this time of year, and we must all use a little extra caution before clicking those links to promotions! You’ll also be tracking all the incoming shipping notifications for your time-saving online orders, and though you may have dodged the crowds, try to stay vigilant as you sort through those shipment and delay notifications for your orders.

Dodging business email compromise attacks

Dodging business email compromise attacks

Losses from business email compromise (BEC) attacks in over 150 countries have reached a whopping $12.5 billion, according to the Federal Bureau of Investigation (FBI). The FBI added that the amount stolen as a result of BEC schemes has more than doubled since last year (up from $5.3 billion), with nearly 80,000 reported worldwide incidents so far compared to a little over 40,203 in 2017.

The United States alone lost $1.6 billion due to BEC from 2013 to the present, and even big companies like Google and Facebook are not immune to this threat.

5 Questions to help you rate your HIPAA competency

5 Questions to help you rate your HIPAA competency

If your organization ever stores or transmits patient health information (PHI), you are legally obliged to comply with the provisions of the Health Insurance Portability and Accountability Act (HIPAA) -- even if you aren’t a healthcare provider.

HIPAA compliance applies not only to healthcare providers themselves, but also their associates and partners, such as insurance providers, accounting firms, quality control, data-storage firms, and other administrative services.

What Are the Cybersecurity Risks Facing Companies with Remote Workers?

What Are the Cybersecurity Risks Facing Companies with Remote Workers?

You’ll be hard-pressed to find a company these days that doesn’t have remote staff. After all, who wants to be chained to an office desk in sunny West Palm Beach when we have instant accessibility to the internet and, in many cases, everything we need to do our jobs?

Unfortunately, this level of freedom does not come without a price.

Hollywood Hacking: 5 cybersecurity clichés that are worse than movies portray

Hollywood Hacking: 5 cybersecurity clichés that are worse than movies portray

In 1995, the movie Hackers launched the world of computer criminals into the limelight with a story of teenage vigilantes taking on corporate greed. It is a hysterically bad movie. In fact, the portrayal of computer hacking was so ridiculous, real-life cyber vandals replaced the movie’s promotional website with one that criticized the “lame” and “cheesy” plot.

URGENT: What business owners need to know about the new PCI requirements

URGENT: What business owners need to know about the new PCI requirements

If you ask the average Rochester business owner which compliance framework is the most onerous, most would say HIPAA. However, despite healthcare privacy regulations fines totalling over $60 million over the past three years, our specialists believe the Payment Card Industry’s Data Security Standards (PCI-DSS) are more troublesome.

Security Update: Meltdown & Spectre Vulnerabilities

Security Update: Meltdown & Spectre Vulnerabilities

As reported by several news outlets, Meltdown and Spectre are the names of two CPU vulnerabilities that impact most currently-used computer processors. It’s important to note that these are vulnerabilities and not the names of specific viruses or infections and that the major risk associated with these issues is information theft.

Spectre and Meltdown: How to protect your business and the costs of an office-wide fix

Spectre and Meltdown: How to protect your business and the costs of an office-wide fix

It’s been almost a month since Spectre and Meltdown -- two of the biggest IT security vulnerabilities in history -- were announced. Hundreds of newspapers, TV anchors and blogs have tried to explain what they are and how they work, but the average Rochester or Buffalo business owner has little interest in the specifics, and we have no intention of adding more confusion to the mix.