patch-management

How to know if your Company is Vulnerable to Attacks

Online safety is crucial for any business, and neglecting to take the necessary precautions to protect your company from malicious online threats can lead to severe consequences for you and your customers. Cyber crimes can cost businesses up to 1.33 billion dollars annually, which can significantly disrupt your company’s financial plans. Therefore, ensuring your company is prepared to face these …

random code screenshot

Making Cybersecurity a Priority

Cybercriminals and data brokers are a common threat to businesses nationwide, which is why infrastructure integrity is something companies need to understand to ensure online safety. Infrastructure integrity refers to the setup you have to promote safety and security; it includes firewalls, anti-virus software, and backups.  You risk compromising your sensitive data if you have yet to invest in cybersecurity. …

digial cloud icon

What is Endpoint Backup and Why Do You Need it?

Whether you experience a ransomware attack, lost or stolen device, or the accidental deletion of a file, a recovery solution is essential. Employee devices, and the network at large, carry critical business information that is often left out of company backup policies.  In these scenarios, an inadequate endpoint (PC’s and laptops) backup option can result in lost data, lost time, …

fading man at a laptop

Understanding different types of Malware

Malicious software — or malware — is talked about when dangerous software is used to access and infect a computer or network without being detected. A lot of people hear terms like viruses, adware, spyware, ransomware, worms, or Trojan horses; these are all different types of malware that can severely damage computers, devices, and networks. Cybersecurity companies like Decypher Technologies …

man disintegrating in front of the PC

Cybersecurity Tips for SMBs

When it comes to cybersecurity, small and medium-sized businesses (SMBs) face unique challenges. They are often targeted by cybercriminals, but have limited resources to invest in robust security measures. There are several simple steps that SMBs can take to improve their cybersecurity posture. Our goal in this blog post is to provide key cybersecurity tips for SMBs. Train your employees …

Common Cybersecurity Acronyms

Cybersecurity is a branch of technology that protects information that is stored digitally from online hackers, however, with such a vast subject, there is a plethora of unfamiliar words and acronyms that the everyday person would not know. As a company that knows A LOT about online security, we want to provide you with a few key acronyms and definitions …

Combatting Business Email Compromise Risks

An old scam that keeps reinventing itself with new victims. Don’t become one!  You’ve probably heard the classic business email compromise (BEC) scam about Nigerian princes who want to deposit money in people’s bank accounts—but first need their prey to send them money to make it all work to plan. It’s an oldie but goodie. Unfortunately, it’s also one that …

business email compromise timeline

Business E-Mail Compromise

Business E-Mail Compromise Since 2013, when the FBI began tracking an emerging financial cyber threat called business e-mail compromise (BEC), organized crime groups have targeted large and small companies and organizations in every U.S. state and more than 100 countries around the world—from non-profits and well-known corporations to churches and school systems. Losses are in the billions of dollars and …

Americans are losing billions due to internet crime

Tips to Shop Securely Online

Because we shop online for nearly everything for our businesses and personal lives, it’s essential to be vigilant about cyber-safety. Here are some tips to make sure you’re shopping securely. Only shop on sites using HTTPS in the URL as opposed to HTTP. If a site is using HTTP, password and payment data can easily be stolen by anyone who …

Cyber-Privacy Basics

Sound advice from our friends at The National Cybersecurity Alliance:    Personal Information is Like Money. Value it. Protect It. Your devices make it easy to connect to the world around you, but they can also pack a lot of info about you and your friends and family, such as your contacts, photos, videos, location and health and financial data. …

The 2020 State of Cybersecurity Networking Event

Farr Shepherd invited to speak at The State of Cybersecurity networking event hosted by Digital Resource. West Palm Beach, FL – 1/29/2020 – Farr Shepherd, President, Decypher Technologies presented The State of Cybersecurity 2020 in partnership with Jim King of Atlantic Pacific Insurance. The presentation was hosted by Digital Resource in West Palm Beach, FL. Farr’s speech covered 2 main …

Managed Services Team – Behind the Scenes

MANAGED SERVICES TEAM – BEHIND THE SCENES Our Managed Services offer a wealth of great benefits. Here’s a brief snapshot of what our technicians are up to on a daily basis to keep our Managed Service Clients’ technology running smoothly, safely and consistently: We monitor servers for functionality to prevent unexpected issues like a drive filling up causing bottlenecks in …

Cybersecurity & Russia, iPhone Charging, and more…

Cybersecurity & Russia, iPhone Charging, and more… Keyboard on Windows If you tend to accidentally press keys on your keyboard (perhaps due to hand tremors), “Filter Keys” can be enabled on Windows to slow down the key response so mistyped or repeated keystrokes don’t register. This accessibility feature doesn’t seem to affect regular typing. Outlook Calendars You can merge calendar …

managed services

What is Managed Services?

What is managed services? It’s a question we hear often, and it’s a valid one. The IT community and MSPs (managed service providers) frequently use the term, but with little to no explanation about what it truly means. We’re here to define managed services and explain the benefits of a managed service plan. The difference really lies between managed services …

windows shortcuts

Memorable Passwords, Phishing, and Troubleshooting

Memorable Passwords, Phishing, and Troubleshooting When Troubleshooting, Don’t Overthink It If your computer is acting erratically, try basic troubleshooting first. This could include powering the machine down, then back up, closing windows and quitting programs. Also, don’t forget about external devices, as sometimes disconnecting these can resolve the issue. Try disconnecting the keyboard, mouse, track pad, etc. to see if …

Important Security Update – Petya Cyberattack

What is Petya? This ransomware is a variant of an older attack, dubbed “Petya,” except this time the attack uses EternalBlue to target Windows systems—the same exploit behind the infamous WannaCry attack. While this variant appears to be an upgraded version of Petya, there is no confirmation that this attack is from the same author. It differs from typical ransomware …

Steps to PCI Compliance

How To Keep Your Browsing Data Private

How To Keep Your Browsing Data Private The government has recently moved to deregulate internet privacy laws so that Americans’ browsing data could be up for grabs to the highest bidder. Internet service providers want to collect as much data as possible to track people’s browsing habits, so they can better market and sell their products to consumers. In an age …

Security Update to the Customer Portal

Your security is a top priority to us! That’s why we are updating the security settings of our Customer Portal, and wanted to let you know how this will impact you. The update includes new password requirements, and may require you to change your password to access your account. To change your Customer Portal password, click “Forgot Your Password” in …

Password Managers: Protecting Yourself in the Age of Hackers

Whether it’s warnings about Heartbleed, the “largest data breach” ever, or Internet browser vulnerabilities, new online security threats are popping up every day. In the age of hackers, what is the number one way to safeguard your data? Use a Password Manager Password managers like LastPass, Dashlane, 1Password and True Key, are highly recommended by security experts as the strongest defense against online vulnerabilities. A password manager will help you …