CarefreeIT News

Stay updated on the latest news in cybersecurity, technology, and more

How much time do your employees waste?

How much time do your employees waste?

Very few employees can honestly say they spend the entirety of their workday actually working. Whether it’s the 15 minutes you spend making your coffee in the morning, or the 10 minutes catching up on Facebook after lunch, the occasional work break is inevitable.

Who’s stealing all the bandwidth?

Who’s stealing all the bandwidth?

Not so long ago it would have been ridiculous to ask a new employer to give you free TV, movies, mail, music, and a camera in case you wanted to work from home and conduct a meeting with coworkers. Yet, with the internet, all of these things and more are at the fingertips of most office employees.

Cloud Etiquette 101

Cloud Etiquette 101

Horrible house guests, we’ve all had them. Whether it be that annoying family member that over stays their welcome, or that old college buddy that leaves beer cans and potato chip crumbles all over your couch, we have all experienced those discourteous visits.

Transitioning to the Cloud

Transitioning to the Cloud

Data loss is not a matter of if, it’s a matter of when – and it happens to every company, big or small. More than half of businesses locate their disaster/backup systems in the same physical location as their primary system – red alert! If you only have one copy of your system’s backup at your office, and your hardware fails or a breach occurs and all your data is stolen, then a backup was completely useless to begin with.

To Cloud, or Not to Cloud

To Cloud, or Not to Cloud

Everyone is talking about cloud computing these days and for good reason. The cloud is revolutionizing how computing power is generated and consumed. Cloud refers to software and services that run on the Internet, instead of locally on your computer. When tech companies say your data is backed up “in the cloud,” it has nothing to do with those white fluffy things in the sky.

Fixing Your Weakest Link: Your Employees

Fixing Your Weakest Link: Your Employees

You can have every piece of security hardware in the books: firewall, backup disaster recovery device, anti-virus; but your employees will still be the biggest vulnerability in your organization when it comes to phishing attacks. How do you mitigate as much risk as possible?

Create and Strictly Enforce a Password Policy: Passwords should be complex, randomly generated, and replaced regularly.

How To Spot A Phishing Attack

How To Spot A Phishing Attack

Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing sites every month, a 65% increase in attacks in the last year, and hackers would have moved on to their next idea for swindling people out of their identities and money.

What Is Phishing & How Are Hackers Using It?

What Is Phishing & How Are Hackers Using It?

While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% in the last year.

Cybersecurity Assessments

Businesses of all sectors and sizes use digital technologies to store confidential information, from employees’ personal credentials to customers’ credit card numbers—and that’s just the beginning. Unfortunately, handling sensitive data always poses a security risk, since business owners and their employees are responsible for protecting it from leaks and breaches.

Report from the FireEye Cyber Defense Summit

Report from the FireEye Cyber Defense Summit

Last week I attended the FireEye Cyber Defense Summit in Las Vegas. For those of you not familiar with FireEye, they are one of the premier cybersecurity companies in the world. FireEye provides cybersecurity services, consulting, and tools to organizations in both the public and private sectors.