Over the last few years, we have seen several tech companies, such as Buffer, Todoist and Help Scout, to name a few, switch to a fully remote or partial work setup. Most of these companies spent months preparing for the switch by training their employees, setting up remote work policies and ensuring the necessary infrastructure…
New Year, New Risks for IT & Data Security
The COVID-19 pandemic has changed everything about the world as we know it. Just as we started embracing new practices like sanitizing, social distancing and remote working, the pandemic has also forced us to embrace systemic changes in the ways we deal with cyberthreats. In fact, the FBI has reported an increase in cyberattacks to…
7 Signs it’s Time to Outsource your IT Services
One recurring topic that continues to come up is the idea of outsourcing your IT, and when is the appropriate time to start taking a serious look at that model. Whether it’s because of budgetary constraints or a laundry list of other reasons, sometimes it’s in your best interest to find a strategic partner that…
The Dangers of the Inbox
Every now and then, an email with a catchy subject line appears in your inbox and you end up clicking on it, either because you’re curious about the subject line or because you assume the sender is trustworthy. Unfortunately, this is how most cyberattacks tend to begin – with a single click. What unfolds next…
COVID-19 Workplace Case Recording: Technical Considerations
As our clients begin the process to safely reopen their facilities to workers, we have received numerous questions focused on the collection, transmittal, and storage of information related to employee medical information related to COVID-19. The following guidance was prepared to assist anyone that may need a starting point as they determine their organization’s course…
Protecting yourself from vendor fraud
What is vendor fraud? Vendor fraud occurs when a fraudster poses as a person or entity you know and trust (a vendor, an executive, etc.) and requests a change to banking information. If the fraudster can convince you to change payment information and you make the payment, any payments sent will go to the fraudster…
Common-Sense Tips to Reduce Your Cyber Risks
At Infonaligy, we deal with many companies who approach us for assistance with improving their organizational cybersecurity. Cybersecurity is a complex topic with lots of moving parts. Very few organizations have an IT environment that could be classified as ‘simple’, and what works in one environment may not work in another. Starting with a solid…
CMMC April Update
Beginning in 2020, any contractor or subcontractor doing business with the Department of Defense will be required to undergo a third-party audit of their cybersecurity maturity under the framework of the Cybersecurity Maturity Model Certification (CMMC). Although some important details and requirements are still being defined, here’s what you need to know to start preparing…
Quick List of Major Security Breaches Over the Last Few Years
It seems we are seeing a new cyber event in the news every day. From local government agencies to major corporations, this is not slowing down. Below, you will see a list of the most significant data breaches in history. Please keep in mind, these companies have teams of security personnel and millions of dollars…
Ransomware costs up, causes 10-day downtime
As Ransomware continues to rise, new reports are showing an increase in the impact towards organizations. Here are a few that were covered: Cyber criminals are cashing in so we will continue to see an increase an phishing scams and attacks on Remote Desktops. We are only as strong as our weakest line, so what…