Online safety is crucial for any business, and neglecting to take the necessary precautions to protect your company from malicious online threats can lead to severe consequences for you and your customers. Cyber crimes can cost businesses up to 1.33 billion dollars annually, which can significantly disrupt your company’s financial plans. Therefore, ensuring your company is prepared to face these …
Making Cybersecurity a Priority
Cybercriminals and data brokers are a common threat to businesses nationwide, which is why infrastructure integrity is something companies need to understand to ensure online safety. Infrastructure integrity refers to the setup you have to promote safety and security; it includes firewalls, anti-virus software, and backups. You risk compromising your sensitive data if you have yet to invest in cybersecurity. …
What is Endpoint Backup and Why Do You Need it?
Whether you experience a ransomware attack, lost or stolen device, or the accidental deletion of a file, a recovery solution is essential. Employee devices, and the network at large, carry critical business information that is often left out of company backup policies. In these scenarios, an inadequate endpoint (PC’s and laptops) backup option can result in lost data, lost time, …
Understanding different types of Malware
Malicious software — or malware — is talked about when dangerous software is used to access and infect a computer or network without being detected. A lot of people hear terms like viruses, adware, spyware, ransomware, worms, or Trojan horses; these are all different types of malware that can severely damage computers, devices, and networks. Cybersecurity companies like Decypher Technologies …
Cybersecurity Tips for SMBs
When it comes to cybersecurity, small and medium-sized businesses (SMBs) face unique challenges. They are often targeted by cybercriminals, but have limited resources to invest in robust security measures. There are several simple steps that SMBs can take to improve their cybersecurity posture. Our goal in this blog post is to provide key cybersecurity tips for SMBs. Train your employees …
Common Cybersecurity Acronyms
Cybersecurity is a branch of technology that protects information that is stored digitally from online hackers, however, with such a vast subject, there is a plethora of unfamiliar words and acronyms that the everyday person would not know. As a company that knows A LOT about online security, we want to provide you with a few key acronyms and definitions …
Combatting Business Email Compromise Risks
An old scam that keeps reinventing itself with new victims. Don’t become one! You’ve probably heard the classic business email compromise (BEC) scam about Nigerian princes who want to deposit money in people’s bank accounts—but first need their prey to send them money to make it all work to plan. It’s an oldie but goodie. Unfortunately, it’s also one that …
October is Cybersecurity Awareness Month!
In honor of Cybersecurity Awareness Month, we would like to share some educational information with you to help keep you cyber-safe. Use our webchat if you have questions! October 2021 edition
Business E-Mail Compromise
Business E-Mail Compromise Since 2013, when the FBI began tracking an emerging financial cyber threat called business e-mail compromise (BEC), organized crime groups have targeted large and small companies and organizations in every U.S. state and more than 100 countries around the world—from non-profits and well-known corporations to churches and school systems. Losses are in the billions of dollars and …
Tips to Shop Securely Online
Because we shop online for nearly everything for our businesses and personal lives, it’s essential to be vigilant about cyber-safety. Here are some tips to make sure you’re shopping securely. Only shop on sites using HTTPS in the URL as opposed to HTTP. If a site is using HTTP, password and payment data can easily be stolen by anyone who …
Cyber-Privacy Basics
Sound advice from our friends at The National Cybersecurity Alliance: Personal Information is Like Money. Value it. Protect It. Your devices make it easy to connect to the world around you, but they can also pack a lot of info about you and your friends and family, such as your contacts, photos, videos, location and health and financial data. …
Have you been hacked? Now what?
Phishing, there I said it. You’ve heard it a million times–and with COVID19, probably a million & 1. But here’s the thing. It’s VERY real, it can happen to ANYONE and you need to be vigilant about it. Try this tool to see if an email address has been compromised and if so, it’s time to consider a password manager. …
Another Windows 10 Update – What You Need to Know
Be wary of the most recent Window 10 update. We’ve seen glitches in updates before but this one seems to be a bit worse than usual. The update is causing an unusually high number of computers to crash and display a blue screen. There have also been reports of documents, photos and videos being deleted from hard drives. Additionally, the …
The 2020 State of Cybersecurity Networking Event
Farr Shepherd invited to speak at The State of Cybersecurity networking event hosted by Digital Resource. West Palm Beach, FL – 1/29/2020 – Farr Shepherd, President, Decypher Technologies presented The State of Cybersecurity 2020 in partnership with Jim King of Atlantic Pacific Insurance. The presentation was hosted by Digital Resource in West Palm Beach, FL. Farr’s speech covered 2 main …
13 Ransomware Statistics All Businesses MUST Know
Notice: JavaScript is required for this content.
Managed Services Team – Behind the Scenes
MANAGED SERVICES TEAM – BEHIND THE SCENES Our Managed Services offer a wealth of great benefits. Here’s a brief snapshot of what our technicians are up to on a daily basis to keep our Managed Service Clients’ technology running smoothly, safely and consistently: We monitor servers for functionality to prevent unexpected issues like a drive filling up causing bottlenecks in …
Take Google’s Phishing Quiz to Sharpen Your Security Skills
Take Google’s Phishing Quiz to Sharpen Your Security Skills This month, we’re sharing a great tool you can use to help train your staff to recognize email phishing attacks. Google has an interactive phishing quiz that is really educational. It’s a lot harder to pass than you might think! The quiz teaches you how to spot key indicators of a …
Cybersecurity & Russia, iPhone Charging, and more…
Cybersecurity & Russia, iPhone Charging, and more… Keyboard on Windows If you tend to accidentally press keys on your keyboard (perhaps due to hand tremors), “Filter Keys” can be enabled on Windows to slow down the key response so mistyped or repeated keystrokes don’t register. This accessibility feature doesn’t seem to affect regular typing. Outlook Calendars You can merge calendar …
What is Managed Services?
What is managed services? It’s a question we hear often, and it’s a valid one. The IT community and MSPs (managed service providers) frequently use the term, but with little to no explanation about what it truly means. We’re here to define managed services and explain the benefits of a managed service plan. The difference really lies between managed services …
Memorable Passwords, Phishing, and Troubleshooting
Memorable Passwords, Phishing, and Troubleshooting When Troubleshooting, Don’t Overthink It If your computer is acting erratically, try basic troubleshooting first. This could include powering the machine down, then back up, closing windows and quitting programs. Also, don’t forget about external devices, as sometimes disconnecting these can resolve the issue. Try disconnecting the keyboard, mouse, track pad, etc. to see if …
Important Security Update – Petya Cyberattack
What is Petya? This ransomware is a variant of an older attack, dubbed “Petya,” except this time the attack uses EternalBlue to target Windows systems—the same exploit behind the infamous WannaCry attack. While this variant appears to be an upgraded version of Petya, there is no confirmation that this attack is from the same author. It differs from typical ransomware …
WannaCry And HummingWhale: Keep Yourself Protected
WannaCry And HummingWhale: Keep Yourself Protected WannaCry The WannaCry virus made quite an impact this month, but the U.S. was less affected than other countries. Over 90% of WannaCry’s victims were running Windows 7, an older operating system, making it particularly vulnerable to threats. The spread of this virus was for the most part preventable, as doing frequent updates (patch …
How To Keep Your Browsing Data Private
How To Keep Your Browsing Data Private The government has recently moved to deregulate internet privacy laws so that Americans’ browsing data could be up for grabs to the highest bidder. Internet service providers want to collect as much data as possible to track people’s browsing habits, so they can better market and sell their products to consumers. In an age …
Cybersecurity Tips To Avoid Getting Hacked
No one wants to get hacked, but the reality of our online environment means it will likely happen sooner or later if we don’t follow the latest cybersecurity tips. This month’s Tech Tips focuses on keeping your information safe to stay ahead of hackers. Keep reading for important tips that will help you stay secure. Strengthen Your Passwords Many of …
Security Update to the Customer Portal
Your security is a top priority to us! That’s why we are updating the security settings of our Customer Portal, and wanted to let you know how this will impact you. The update includes new password requirements, and may require you to change your password to access your account. To change your Customer Portal password, click “Forgot Your Password” in …
Decypher Tech Tips, Feb. 2016 – A Malware Infographic
We want to keep you informed with the latest technology tips, and we found this infographic from Cisco about the growing threat of malware to be very informative. If you feel that you may have been compromised by malware or would like to reduce the risk of compromise, please contact us immediately for assistance. Call us today at 970.373.5428. Best, …
Password Managers: Protecting Yourself in the Age of Hackers
Whether it’s warnings about Heartbleed, the “largest data breach” ever, or Internet browser vulnerabilities, new online security threats are popping up every day. In the age of hackers, what is the number one way to safeguard your data? Use a Password Manager Password managers like LastPass, Dashlane, 1Password and True Key, are highly recommended by security experts as the strongest defense against online vulnerabilities. A password manager will help you …
The Heartbleed Bug – What You Can do to Protect Yourself
The Internet has run wild with reports of a new security threat, the “Heartbleed” bug. What is it, how does it affect you, and what can you do about it? In simple terms, Heartbleed is a vulnerability that affects some websites, potentially exposing users’ passwords and other information for hackers to see. For websites, the issue can affect personal information …