2018 Cybercrime Statistics (Reference Material)

2018 Top Cybercrime Facts and Why You Should Care

Cyber Crime Stats

2017 saw some of the most devastating high-profile cyber attacks in the history of business. This happened despite tech giants constantly releasing security patches and updates. As the number of such attacks continues to rise, 2018 requires businesses of all sizes to be even more prepared given that cyber-criminals are not often selective when choosing their targets.

Below are some startling cybercrime facts that should inform your approach to cybersecurity in 2018 and beyond.

A hacker attacks an internet-connected computer every 39 seconds in the US.

The University of Maryland’s Clark School recently found that that 1 in every 3 Americans has already been on the receiving end of a cyber-attack.

While this statistic may apply to the United States, your business does not have to be located there for you to care. Cybercriminals exist on the World Wide Web and do not discriminate their targets based on geographies when perpetrating their crime. So, you can never really tell when you’re going to be targeted.

1 in 5 businesses faced at least 25-hours’ downtime from ransomware attacks in 2017.

Ransomware is the form of malware (malicious software) that a bad actor injects into your computer enabling them to take control of your system, denying you access to your data and threatening you with harm unless you pay up. The attacker usually demands a ransom in exchange for access to your files, even though, in some instances, the criminals do not fully grant access. Paying the ransom doesn’t always guarantee that everything will be restored.

A survey by Osterman Research found that ransomware attacks were the most common in 2017, leading to massive losses to businesses from the inflicted downtime. Many businesses had to shut down their systems for extended periods of time – up to 100 hours or longer.

Small to medium-sized businesses are increasingly vulnerable to cyber-attacks.

The number of SMBs that experienced a cyber-attack over the course of 2017 was 61 percent. This number was 55 percent in the previous year. Approximately 54 percent of these organizations lost employee and customer data due to cyber theft.

This information is consistent with a separate survey that found smaller organizations to be increasingly targeted because of their tendency to discover security breaches late. Small Business Trends reports that the percentage of cyber-attacks targeting small organizations rose from 15 to 43 percent of total attacks between 2011 and 2015. Smaller businesses and organizations tend to have fewer cybersecurity resources, hence are a favorite target for ransomware and crypto-jacking attacks.

Most threats emanate from the employees.

The human element within organizations remains the main point of weakness as far as cyber security is concerned. Negligent employees or contractors result in up to 54 percent of all data breaches. This is up from 48 percent the year before, according to the Ponemon Institute’s 2017 report on the State of Cybersecurity in Small and Medium-sized Businesses.

Cybercriminals frequently target the workforce with malicious emails and websites which an employee may easily click on, setting themselves up for malware attacks.

One recommended way to mitigate these kinds of threats is to train employees to practice some level of cybersecurity housekeeping. This can include simple acts such as logging out of their systems, not logging into company databases from unsecured Wi-Fi, as well as keeping their passwords secret.

Reminding employees of the importance of such good cybersecurity practices can go a long way in staving off ransomware and other cyber threats.

Global toll of ransomware attacks hit $5 billion in 2017.

Estimates indicate that the cost of ransomware damage reached $5 billion in 2017, which is more than 15 times the cost incurred in 2015; barely two years earlier. Businesses experience massive losses in downtime, related fines, and productivity losses. The actual amount of the ransom you pay only comprises a fraction of this overall cost.

The annual cost of cybercrime projected to reach $6 trillion by 2021.

The global toll of cybercrime damage is estimated to hit a whopping $6 trillion annually by 2021. This is because state-sponsored hacking and organized crime are projected to rise steeply making cybercrime more profitable compared to the worldwide drug trade. Unlike drug traffickers, cyber-criminals are difficult to catch and rarely are punished for their crimes.

Cybercrime continues to become more lucrative, making it more appealing to prospective and current perpetrators. And with the growing sophistication of the tech world, you can expect the tactics that cybercriminals use to evolve.

What can be done?

Expert assessments hold that organizations can strengthen their cybersecurity through some very basic measures. These foundational steps can readily be implemented.

Since most of the successful cyber attacks exploit the human element, plugging this loophole can work for both small and big companies alike. Start by educating your personnel about the cybersecurity Dos and Don’ts  through such simple acts as putting up memos around the office with messages such as “do not share your password with anyone” or “log out the system when you finish.” Ask a local IT expert to come out and speak to your employees about the importance of cybersecurity.

Adopt the use of more secure emerging technologies.

Organizations that use various emerging solutions that are more hardwired to withstand cyber threats, such as Microsoft Office 365 products, report better protection against cyber-attacks. In light of the increasing cyber threats, consider using solutions that can not only detect existing threats, but also pre-empt, investigate, and respond to new threats even before they are executed. Most experts agree that the proactive approach to cybersecurity is the best way to go.

Microsoft Common Security Threats (Questions/Answers)

Microsoft Security

Common Security Threats and How Microsoft Security Helps Mitigate Them

Advanced modern technologies such as cloud computing and virtualization have completely revolutionized the workforce. Remote working arrangements have now become increasingly commonplace. Along with this advancement is an expanded network footprint characterized by myriads of virtualized workloads. This includes personal devices and computers that represent multiple points of connectivity as well as potential vulnerabilities.

In the middle of all this, we find every organization’s weakest link as far as cyber security is concerned: the human element. Untrained employees, who comprise a huge percentage of the workforce in most organizations, will readily click malicious URLs or browse suspicious websites. All without realizing that they may be enabling malicious scripts to run and allowing weaponized documents to get past their systems’ standard defenses.

Bad actors are well aware of these human tendencies and are always out to exploit them in dozens of different ways. This represents a few of the numerous ways in which organizations are susceptible to potential cyber-attacks.

Attack vectors that commonly lead to data leaks within organizations

Security threats within an organization can originate from within the organization or from outside.

  • Internal threat

The threat originates from within the organization itself and includes acts of espionage or various methods of employee data theft.

External sharing of sensitive information

In some instances, a competitor or some other party interested in the company’s data can approach an employee and offer them payment in exchange for sensitive, privileged information.

Compromised employees or industrial spies may share sensitive data with outsiders. They pose a serious internal threat to data security.

Lost device(s)

With mobile or remote employees, a lost device may fall into the hands of anyone who can then access their files and download them for use in any harmful way.

Mobile employees, especially cloud users, may also attempt to log into the company’s database remotely from an unknown PC. If the PC is infected, this can seriously compromise the security of the data itself.

  • External threat

This threat is initiated by forces from outside the organization and often exploits various weaknesses in the data security system or network infrastructure. Unintentional data leakage can occur through any of the following:

Phishing attack

Phishing refers to the fraudulent attempt by bad actors to obtain sensitive information including usernames, passwords, and sometimes credit card data – depending on the intentions of the attacker. They often do this by disguising themselves as a trustworthy party in electronic communication methods such as emails.

Normally, the data thief creates a Web page replicating an existing one to trick a user into submitting their personal, financial, or login details that the cybercriminal can then use for illicit purposes.

In many cases, the untrained individual receives an email from what appears to be a reliable source asking for reauthentication. Upon clicking the link and providing the requested information – often a username and password – this individual allows the attacker to infect their machine with malware. The cyber-thief may additionally be able to steal the individual’s identity.

Once an employee’s device is compromised, the attack can spread throughout the organization in any of the following forms.

  • Internal sharing of malware

Through an infected device, an attacker can spread the malware throughout the organization’s network. They may be able to access various databases to which the victim has privileged access. They can then steal whatever data they want once the network is compromised.

  • Identity theft

With stolen credentials, an attacker will have unrestricted access to sensitive information while disguised as an employee. A stolen identity gives the bad actor an easy way into the organization’s network. Once inside, they can set about moving around, searching for sensitive information to steal while impersonating a legitimate user.

How Microsoft Security increases your protection against these threats   

Microsoft has multiple ways in which it can increase your protection against various threat scenarios at different levels. For starters, there is the Windows Defender Antivirus program which could block known threats on user’s devices.

Microsoft also has the Windows Defender Advanced Threat Protection program that can detect, investigate, and respond to new or unknown threats using the power of AI – eventually mitigating the infection on personal devices.

Office 365 Advanced Threat Protection allows for a reputation check, making sure that the URLs you’re clicking on are legitimate. This can be a great way to safeguard employees from phishing attacks.

This also comes with Multifactor Authentication that is specifically designed to prevent hackers from logging in to the potential victim’s account. This is a perfect way to protect users from identity theft. Requiring the device to be compliant also helps prevent the spread of malware from one infected device to another.

Cloud Protection

Microsoft has the Office 365 Cloud App Security which spots abnormal behavior. This means it can prevent intentional data leakage and seal off that loophole.

To protect the data itself, Microsoft has Azure Information Protection which allows for policy controls to be put in place ensuring that only certain people can view these files.

Intune, a security management tool, also allows users to create conditional access rules in their device around the data itself. This ensures the safety of data in the case of a lost device or attempted login from unknown PCs. An untrusted device wouldn’t be able to access files protected by Intune.

Conclusion

With these protection metrics, Microsoft 365 is the go-to solution for any organization. These security measures work to safeguard your network from various security threats by preventing, controlling, detecting, and responding to any threat scenario.

Microsoft Security

Online Gaming Addiction Deemed a Classified Disease by World Health Organization

Exploring strategies for understanding and responding to online gaming addiction

Online Gaming Addiction

It’s no secret that professionals across the healthcare and technology industries have been scratching their heads about online gaming for years. More and more, professionals – particularly in the healthcare sector – have developed a growing concern about just how impactful online gaming can be – especially for the smartphone generation.

For modern youth who spend an increasing amount of time plugged into laptops and smartphones, professionals worry that the allure of online gaming can result in a downright addiction—an addiction that results in irrational cravings and an uncontrollable need to keep playing.

There’s no doubt that just like with any other addiction, this type of compulsive online game use can have serious detrimental consequences in the real lives of over-users. A strong compulsion for internet games can have negative impacts on youth relationships, schooling, and employment, in addition to their physical and mental health. That’s why, healthcare professionals across the globe are emphasizing the need to recognize over-gaming for what it is – a behavioral addiction.

Concerns Take Effect: World Health Organization Declares Gaming Disorder as Classified Disease

Recently, the World Health Organization (WHO) announced that ‘gaming disorder’ will be officially recognized under their International Classification of Diseases. This is an incredibly significant move by the WHO and the formal classification will greatly improve awareness and understanding of the disorder. Further, with a formal classification, impacted youth and families will have more options for treatment, help, and funding.

The official WHO classification defines online gaming addiction as such:

“…impaired control over gaming, increasing priority given to gaming over other activities to the extent that gaming takes precedence over other interests and daily activities, and continuation of escalation of gaming despite the occurrence of negative consequences.”

Thanks to this informed decision by the WHO, families looking for more serious and dynamic treatment options will have global support behind them. This means the opening up of spots for gaming addicts at inpatient clinics and long-term rehabilitation facilities.

Keeping a Watchful Eye: Is Your Child Showing Signs of Gaming Addiction?

Understandably, the WHO announcement has many parents giving a second thought about their own children’s online habits. Young kids play video games – this is not a new phenomenon and games are not inherently dangerous to kids. However, there are key warning signs to be on the lookout for if you’re concerned your child’s gaming borders on over-use or addiction.

Check out these top 4 warning signs to ensure your child’s game use isn’t out of control:

1.     Preoccupation & Compulsion

Does your child spend all their time playing a specific game or set of games? Do they have a hard time talking about anything else when they are offline? If your child seems to have a compulsive need to log on and play or if they can’t seem to think or talk about anything else, gaming addiction could be present.

2.     Over Spending Time & Money

Are you constantly catching your child red-eyed and up way past a normal bedtime, playing an online game? Does your child have a habit of overspending their money or yours on video-game related purchases? If all your child’s time and money are being directed toward their game use, they could be suffering from gaming addiction.

3.     Erratic Emotions

Does your child get irrationally emotional when they are unable to access or play their game? Do they get very defensive when you question them about their game use? Does your child have strong emotional reactions when they aren’t doing well in their game? If you notice that your child’s emotions are hard to regulate and seem to spike and drop based on gaming outcomes, it may be time to get professional help.

4.     Neglecting Other Areas of Life

Has your child recently seen their grades drop? Does your child often ask to stay home sick from school just to spend the day playing games? Does your child neglect their part-time job, friendships, or extra-curricular activities in order to game? If so, your child is likely struggling with a serious addiction to gaming.

A Playbook for Parents: How to Curb the Risk of Gaming Addiction in Your Kids

All of this information is understandably worrisome for parents – especially as the younger generations become more and more reliant on technology for occupation and entertainment. That’s why, no matter how frightening gaming addiction seems, there are always concrete strategies for parents and kids to rely on, in hopes of stopping addiction in its tracks.

Check out these strategies for managing gaming addiction:

1.    Recognize the Cravings

First things first, there has to be an acknowledgment of a problem. Understanding that your child has compulsive cravings for a game will help remind both you and them that this is a disorder. Recognize when the cravings to play happen and try to get to the root cause.

2.    Get Active, Get Outside, Reconnect with Friends

Encourage your child to physically move their body. Exercise or team sports are a great way to get positive endorphins pumping. Encourage your child to spend time with friends, go outside, and become more active. This can be a great first step in breaking the cycle of addictive behavior.

3.     Be Aware of Viral Games

For today’s social media generation, a new game can go viral in no time at all. This is a huge trigger for kids who have a tendency to get addicted quickly. With all their friends talking about how awesome a new game is, kids will want to see what all the hype is about. Knowing what to look for is half the battle, so make sure to keep an eye on new games that are sweeping kids up in a viral tornado.

4.    Be Firm

No one likes giving tough love – especially when we know our kids are struggling. But unfortunately, tough love will be required in the fight against gaming addiction. There will be times when your child is begging you to play for just one more hour. They may get nasty and try to disobey your rules. Do your best to remain firm.

5.    Enlist Tech Help  

In the struggle to face gaming addiction head-on, it may be helpful to install some kind of parental controls, making it harder for your kids to spend unattended time online. There are various tools available to block sites and monitor your children’s internet use so you can make sure their habits aren’t out of control.

No matter what approach you take, staying in-tune with your kids’ gaming habits and internet use is a noble task for all parents. The world our children are growing up in is increasingly digital and they’re faced with countless games and apps to avert their attention and get them hooked. Parents need not snatch away the smart-phone every time, but they do need to stay on high alert to make sure tech use doesn’t escalate into compulsion and addiction.

If you’re worried about your child’s online gaming or internet use and aren’t sure how to get better control of the issue, why not reach out to a local team of IT experts. IT professionals are well-versed in a variety of solutions that will help you better monitor and manage your kid’s online activities.

 

You don’t have to ban the internet completely, but you shouldn’t ignore the issue either. Consult a local team of tech specialists to help find a happy medium that will keep your kids healthy, safe, and connected. 

Microsoft Security: Common Security Threats

Common Security Threats and How Microsoft Security Helps Mitigate Them

Advanced modern technologies such as cloud computing and virtualization have completely revolutionized the workforce. Remote working arrangements have now become increasingly commonplace. Along with this advancement is an expanded network footprint characterized by myriads of virtualized workloads. This includes personal devices and computers that represent multiple points of connectivity as well as potential vulnerabilities.

In the middle of all this, we find every organization’s weakest link as far as cyber security is concerned: the human element. Untrained employees, who comprise a huge percentage of the workforce in most organizations, will readily click malicious URLs or browse suspicious websites. All without realizing that they may be enabling malicious scripts to run and allowing weaponized documents to get past their systems’ standard defenses.

Bad actors are well aware of these human tendencies and are always out to exploit them in dozens of different ways. This represents a few of the numerous ways in which organizations are susceptible to potential cyber-attacks.

Attack vectors that commonly lead to data leaks within organizations

Security threats within an organization can originate from within the organization or from outside.

Internal threat

The threat originates from within the organization itself and includes acts of espionage or various methods of employee data theft.

External sharing of sensitive information

In some instances, a competitor or some other party interested in the company’s data can approach an employee and offer them payment in exchange for sensitive, privileged information.

Compromised employees or industrial spies may share sensitive data with outsiders. They pose a serious internal threat to data security.

Lost device(s)

With mobile or remote employees, a lost device may fall into the hands of anyone who can then access their files and download them for use in any harmful way.

Mobile employees, especially cloud users, may also attempt to log into the company’s database remotely from an unknown PC. If the PC is infected, this can seriously compromise the security of the data itself.

External threat

This threat is initiated by forces from outside the organization and often exploits various weaknesses in the data security system or network infrastructure. Unintentional data leakage can occur through any of the following:

Phishing attack

Phishing refers to the fraudulent attempt by bad actors to obtain sensitive information including usernames, passwords, and sometimes credit card data – depending on the intentions of the attacker. They often do this by disguising themselves as a trustworthy party in electronic communication methods such as emails.

Normally, the data thief creates a Web page replicating an existing one to trick a user into submitting their personal, financial, or login details that the cybercriminal can then use for illicit purposes.

In many cases, the untrained individual receives an email from what appears to be a reliable source asking for reauthentication. Upon clicking the link and providing the requested information – often a username and password – this individual allows the attacker to infect their machine with malware. The cyber thief may additionally be able to steal the individual’s identity.

Once an employee’s device is compromised, the attack can spread throughout the organization in any of the following forms.

Internal sharing of malware

Through an infected device, an attacker can spread the malware throughout the organization’s network. They may be able to access various databases to which the victim has privileged access. They can then steal whatever data they want once the network is compromised.

Identity theft

With stolen credentials, an attacker will have unrestricted access to sensitive information while disguised as an employee. A stolen identity gives the bad actor an easy way into the organization’s network. Once inside, they can set about moving around, searching for sensitive information to steal while impersonating a legitimate user.

How Microsoft Security increases your protection against these threats   

Microsoft has multiple ways in which it can increase your protection against various threat scenarios at different levels. For starters, there is the Windows Defender Antivirus program which could block known threats on user’s devices.

Microsoft also has the Windows Defender Advanced Threat Protection program that can detect, investigate, and respond to new or unknown threats using the power of AI – eventually mitigating the infection on personal devices.

Office 365 Advanced Threat Protection allows for a reputation check, making sure that the URLs you’re clicking on are legitimate. This can be a great way to safeguard employees from phishing attacks.

This also comes with Multifactor Authentication that is specifically designed to prevent hackers from logging in to the potential victim’s account. This is a perfect way to protect users from identity theft. Requiring the device to be compliant also helps prevent the spread of malware from one infected device to another.

Cloud Protection

Microsoft has the Office 365 Cloud App Security which spots abnormal behavior. This means it can prevent intentional data leakage and seal off that loophole.

To protect the data itself, Microsoft has Azure Information Protection which allows for policy controls to be put in place ensuring that only certain people can view these files.

Intune, a security management tool, also allows users to create conditional access rules in their device around the data itself. This ensures the safety of data in the case of a lost device or attempted login from unknown PCs. An untrusted device wouldn’t be able to access files protected by Intune.

Conclusion

With these protection metrics, Microsoft 365 is the go-to solution for any organization. These security measures work to safeguard your network from various security threats by preventing, controlling, detecting, and responding to any threat scenario.

Microsoft Security

Cybersecurity Risks (Problems/Fixes)

The Top 5 Cybersecurity Risks Your Company Hasn’t Considered

Exploring the leading cybersecurity threats facing business professionals today

Cybersecurity Risks

There’s no getting around the prevalence of cybercrime today; it’s happening more and more, all across the globe. Even worse? The identity thieves and malicious attackers lurking behind the scenes are getting better at exploiting weaknesses to get their hands on confidential business data.

Understandably, business owners are often scrambling to ensure they’re doing enough to keep security tight. Maybe they invest in some “total solution” software or perhaps they overload a tech savvy employee with IT security work. Some business owners simply decide to roll the dice and hope for the best. Whether it’s doing too much or too little, business professionals often get caught up in a less-than-ideal approach to cybersecurity.

So, with all the horror stories in the headlines about companies and government agencies getting breached, what’s a business owner to do? The key is to remain focused and strategic so you can put together a level-headed plan. This involves taking a closer look at some of those gargantuan cyber threats we often forget about.

Narrowing Down the Doom: 5 Concrete Risks You Can Focus on Fixing Today

In order to develop a realistic and strategic approach to cybersecurity, you have to cut out all the noise. Put the headlines and your own fears to the side and try to stay focused on the things you and your staff can control. Think long and hard about the various ways cyberattacks could occur in your organization and then consider how you can work to close the gaps in each section.

Check out these Top 5 Security Risks that your organization must be carefully managing:

 1. Your own team

No one likes to admit that internal risks exist, but the reality is that employees are the weakest link in the cybersecurity chain. Sometimes these internal threats are malicious, but most often it’s a matter of ignorance and carelessness. In fact, human error is the catalyst for the vast majority of cyber-attacks on businesses.

The reality is, an uninformed and unprepared team can have drastic consequences for your organization’s cybersecurity. You may have employees who are more likely to click a malicious link or download a bad file from a phishing scam. Perhaps your team receives fraudulent business email compromise (BEC) scams that seem legitimate. No matter the error, your workforce – when uninformed – can put your organization at serious risk.

How to tackle an uneducated team:

The best way to counteract employees who aren’t in the know is to teach them! Yes, this will require some investment of time and resources but in the long run, your organization will be stronger and more secure.

Find ways to get your team on board and help empower them to be cybersecurity superheroes. Help them determine how to identify threats and create an environment for open and honest communication about suspicious activity of any kind. With an informed and vigilant team, your cybersecurity woes will be reduced significantly.

Password malpractice

Passwords are supposed to keep your organizational and employee data safe and secure. But when’s the last time your team changed their passwords? Is there a culture of password-sharing or posting in your office that threatens security? For that matter, have you and your team ever had an open conversation about choosing strong passwords? These are questions you must ask yourself in order to get on top of password malpractice.

How to manage password malpractice:

Like with any other part of your business, best practice for password management is to have standard operating procedures in place to ensure your team knows what is expected.

Make it a rule that passwords must be kept private and changed on a 30 or 60-day basis. Mark calendars with password change dates and makes it a group activity. Make it a rule that passwords must be unique and not repeats of old passwords or other accounts. Ensure there is a chain of command for access and control – superiors should never be sharing login credentials with employees – no matter how convenient. Finally, consider setting up two-factor authentication at all endpoints to add an extra layer of verification security.

2. Patch procrastination

In an increasingly digital workforce, hardware and software updates seem to pop-up daily. However, it is becoming blatantly clear that updated software and hardware are a critical part of maintaining strong cyber security. Why? Because updates very often include patches designed specifically to fix security holes or glitches. Who can forget the massive WannaCry scam from 2017? Even though a patch had been released in March, it had not been installed on countless machines who were then infected by the virus in May.

Even with the high profile WannaCry case, it is still common practice for many business professionals to avoid or put off software updates. Sometimes there is fear of change or increased technical issues once an update is installed – and this can happen. However, for the most part, updates are designed correctly and will work wonders by patching unseen security flaws. This can make a huge difference in keeping your network secure.

How to stop patch procrastination:

Again, schedule your updates and mark them on calendars as much as possible. Taking the time to make a physical note will help emphasize the importance of staying on top of patchwork.

Most importantly, when your machine gives you a reminder to install an update – install it! Get out of the habit of clicking “Remind Me Later” – your network will thank you. It’s not just about security either. Staying on top of updates and patches will help your systems run at optimal capacity at all times. Make updates to your new habit and explain this priority to other administrators.

3. Other organizations

This is perhaps the biggest risk that business professionals often forget. It’s not just your own cybersecurity practices you should be worried about – it’s the other companies you work with. Vendors, business partners, consultants – basically any organization that your company deals with can impact the safety of your business data.

Even if you have the strongest internal cybersecurity plan in place, if a third-party vendor has less than perfect cyber security practices, attacks could find a way to access your network. The recent Petya attack is a good example of this. The bottom line is that any company that you transmit data to and from is a potential vulnerability for your own network. The last thing you want is to invest time and money to keep your network secure, only to have it breached thanks to another organization’s lax policies.

How to counteract the poor cybersecurity practices of others:

First, its critical to make your own standards clear to the partners you’re working with. While you can’t force them to get smarter about their own security, letting them know that you take cybersecurity seriously right off the bat is a great way to be transparent and encourage their vigilance.

Second, there are technical tools available to help mitigate the risks involved with external vendors. Network segmentation or divided servers can help ensure vendors only access the necessary parts of your network and nothing else. This can be a great safeguard that will help mitigate the risk of vendor weak spots.

4. Bring Your Own Device (BYOD) chaos

Alright, it’s no secret that pretty much everyone has a computer in their pocket or purse these days. Between smartphones, tablets and laptops, taking your favorite machine on-the-go is now easier than ever. Understandably, this has translated to the workplace with the Bring Your Own Device (BYOD) craze. BYOD can be a convenient, cost-effective, and morale-boosting practice for small businesses.

However, there is a downside to letting endless personal devices through the doors and onto your business network. In fact, the security risks involved can be pretty serious. Simply put, personal devices likely do not have the same security standards and protocols that corporate devices do. This can leave your organization wide open and much more susceptible to hacks and data breaches.

How to balance BYOD benefits and risks:

Said it once and we’ll say it again: get policies and procedures on paper if your organization allows staff to bring in their own devices. Make sure your employees know the risks involved and come up with some detailed policies that will keep your network as secure as possible.

Make sure personal devices are only able to access the corporate networks through a virtual private network (VPN). Additionally, ensure that all employees have two-factor authentication set up on their accounts to maintain adequate verification. Just like all the other areas, proactive education is crucial. An informed team will make all the difference.

5. Putting Your Plan in Action: Consult the Pros if Necessary

Now that some of the basic groundwork has been laid, it’s time to ditch the hopelessness and procrastination and get your plan in action. There’s no denying that business professionals are constantly on-the-go, but making cybersecurity a top priority is a critical way to ensure your IT infrastructure is protected.

But hey, it can be a tough process to start. If you’re feeling lost or unsure, don’t hesitate to reach out to a local IT partner. A team of experts can help you begin thinking technically and strategically. It’s not just about calling someone in to fix the problem. The right IT partner will help empower you and your team so you’re thinking more like an IT expert.

Stopping Cyber Threats In Small Business (Training/Education)

Best Way to Improve Cybersecurity? Train Your Employees!

Why an informed team is your organizations best defense against cybercriminals

Cyber Security Training

Cyber attacks and data loss are the last thing any organization wants to fall victim to. In an increasingly digital workforce, companies are investing in all kinds of cybersecurity efforts to ensure the bad guys can’t invade their business network. This kind of security is even more important in professional services industries like finance, law and government. The more sensitive the data, the more cybercriminals want it.

The world of Information Technology is definitely evolving and rising to meet the increasing threat. However, even as technological solutions and regulatory standards are developed, the cybercrime landscape is increasingly sophisticated and complex.

Particularly, preventing cybercrime can be incredibly difficult considering the vast majority of cybersecurity issues occur as a result of human error. That’s right. Your very own employees should be your number one concern when tightening cybersecurity. Even worse? These internal threats can be very hard to identify and address because they’re so pervasive and widespread. The bottom line is that without a ‘cyber-literate’ team, your business network will always be open to increased threat.

How An Educated Team Helps Secure Your Network  

Helping your staff become and stay ‘cyber-literate’ is critical based on the very fact that most cases of data breach and loss result from an employee’s lapse in judgment. Whether the internal threats you face are malicious – like a disgruntled and spiteful worker – or more benign – like an employee who struggles with basic email technology – facing them head-on is critical.

Minimizing human errors like downloading malicious files or clicking a malicious link can make a world of difference in reducing your vulnerability to cybercrime. So, what’s the best way to minimize human error? Educate and empower your team to be their own cybersecurity experts. Without driving awareness and understanding, your team will never be truly prepared. Take the reins and help your team better identify, respond to and report suspicious cyber activity.

Not Just a Security Boost: How Security Awareness Training Improves Employee Morale and Retention 

The really great thing about security awareness training is that it really isn’t just about tightening security. Taking the time to invest in security awareness training for your staff can be a major team-building and morale-boosting initiative. Offering your team specialized training and professional development helps you communicate just how valuable they are to your organization. Even better, it makes them want to stick around – meaning your employee retention rates will be nurtured.

You may be asking: how in the world does security training make my team more committed and loyal. The answer is simple: when you include your team in mission-critical tasks, they know they’re important and valued pieces of the puzzle. It really is that simple. If your employees feel valued, included and taken care of, they will be better advocates for your organization as a whole. This means they’ll be more committed to realizing objectives and making sure the company has all its bases covered.

Plus, it doesn’t hurt that security awareness training can be an exciting break from the boring and mundane tasks of the regular workday. Who doesn’t want a job with a little bit of excitement built in? By working with your team to research and understand cyber threats – both internal and external – your team gets to focus on something new and out-of-the-ordinary. You can even let your team spearhead initiatives and stage simulation attacks to keep co-workers on their toes. Make it even more fun by creating internal competitions or offering incentives. Do whatever it takes to help your team become the masters of the technology they use day in and out.

Overall though, the biggest benefit of security awareness training for your staff is the overall improvement of your organization’s success. With a happy, informed and productive team, your network is safe and more secure from threats of all kinds. Undertaking an educational and fun team approach to cybersecurity really makes all the difference in producing positive and lasting results. Don’t leave your cybersecurity discussions limited to manager meetings behind closed doors. Involve your team, ask for their input and make sure everyone is on the same page. This is a surefire way to keep your team feeling valued and your company successful.

Empowering your Team: Tips for Effective Security Awareness Training

So, it seems like a no-brainer: get your staff well-versed in cybersecurity objectives and all will be well, right? This is true, but it’s critical to go in with a plan. Creating an effective security awareness training program for your team means you must keep a few baseline suggestions in mind. Using these suggestions as a starting point will help you develop a custom-tailored plan to meet the needs of your business and ensure all your cybersecurity concerns are shared with your team.

Check out these preliminary suggestions for effectively training your team in all things cybersecurity:  

  • Know Your Weak Spots

The first step is knowing where exactly you need your team to be extra vigilant. Are email phishing scams your biggest concern? Do you need your team to be more careful with sharing access control data? Whatever your weak security spots are, be sure to identify them and discuss them transparently with your team.

  • Avoid Doom and Gloom

Of course, you want to make sure your team is aware of the threats you face, but the last thing you want to do is scare them into silence or make them constantly dread an impending security crisis. As much as possible, keep it light and keep it fun. Avoid the doom and gloom and find ways to make this a team-building exercise instead of a divisive warning.

  • Empower Your Team

The best thing you can do when working to train your staff in all things cybersecurity, is to let them lead the charge. Ask their opinions about various threats. Allow them to offer strategic suggestions and provide their input. The more you empower your team to take initiative, the better they will be at protecting data on the frontlines.

  • Consult an Expert

Another great suggestion when undertaking security awareness training for your team is to check in with a local team of IT security experts. If you’re wondering how to start and what you should focus on, consultation with a strategic IT partner can make all the difference in getting you and your team on the right path. IT professionals have the experience and expertise to help you build a strong internal cybercrime defense.

No matter what industry you’re in, helping your team better understand cyber threats and strategies for mitigation is critical to the success of any modern business. The last thing you want is for one of your team members to inadvertently welcome cybercriminals into your network. You really don’t have to live with this constant fear. Take the initiative to get on the same page as your team – let them know the threats you face and empower them to take action in anyway you see fit.

Once you have your own team prepared and in your corner, you’ll be better able to take on any cybercrime battle that comes your way. Consult with a team of professionals to find out exactly what you and your team should be doing to stay secure.

Revolutionize Your Company Schedule with Microsoft Staff Hub

New Office app is a scheduling game-changer for managers and employees

If there’s one thorn in the side of every business, it’s mastering an efficient and functional schedule for the whole team. Between various levels of employees, diverse job types and differing time allotments, making a consistent and easy-to-access schedule can be a huge challenge.

Of course, in the increasingly tech-based work world, countless companies are arriving on the scene claiming to have the newest and best scheduling solution that your company MUST take advantage of. Listen, there are some great stand-alone solutions out there, but often the big promises offered don’t measure up. Even worse, what good is a scheduling solution if it isn’t integrated with all the other applications you already use for calendar tracking and communication?

That’s why business professionals of all kinds are excited about the latest app from Microsoft, called StaffHub. StaffHub is truly changing the game for scheduling in the workplace and the best part is, the application is designed with Microsoft’s familiar and functional signature touch.

Tell Me More: What Exactly is StaffHub?

StaffHub is the latest productivity application released for Office 365. The application is designed specifically to better connect staff and managers to the critical scheduling data they need each day. The application is all about easy access, easy modification and easy communication to ensure that the team is always on the same page and scheduling conflicts are put to rest.

Check out some of the BEST features that StaffHub provides:

Easy Schedule Creation and Sharing

Managers are able to easily create schedules and share the content with their employees seamlessly. The StaffHub app and its data can be accessed from any mobile device through the Office 365 app. Gone are the days of the printed schedule on the wall of the office. With StaffHub, workers can simply open the app to see their upcoming scheduled shifts.

Supreme Schedule Display and View Options

Not only is the schedule easier to create and access in the app, StaffHub makes it look better too! Say goodbye to scratched out times and names on your paper schedule. The StaffHub schedule appears on an attractive and organized grid that can be color-coded for ease. There are also many different viewing options. Users are able to switch between monthly, weekly, or daily views and tapping on an individual shift shows more details. There’s even an option to view the total scheduled hours for each employee.

Streamline Shift Switches

Ah, a manager’s worst nightmare. You spend hours creating a schedule only to get three different employees at your door requesting changes. With StaffHub, this nightmare ends now. When scheduling conflicts come up, StaffHub makes it easy for workers to request a switch. Simply tap the shift in question, select the person to switch with and voila! A request is sent directly to the manager for final approval. This way, you stay in constant control of your schedule while keeping your team happy and organized.

Integration and Communication

As mentioned, there are a lot of stand-alone apps that promise a revolutionary scheduling solution. However, StaffHub is unique in that it is entirely integrated and compatible with Office 365 apps – making communication and collaboration a breeze. Employees can exchange messages and access other content through the StaffHub app. Even better? StaffHub is compatible with Azure Active Directory, meaning managers can add and remove team members as necessary.

Streamlined Success: StaffHub Makes for Happy Managers and Content Staff

Overall, StaffHub is a great tool for streamlining processes and keeping your entire team on the same page. When team members are able to easily understand what is expected of them and access the critical data that they need, jobs get done quicker and employees are more motivated to work. While countless providers are on the market claiming to be the productivity powerhouse, it’s a good idea to peek at what you may already have included in your Microsoft Office 365.

By taking a look at your existing infrastructure before you commit to any applications or solutions, you’ll have a better idea of what specific features you need and how to revamp your tech solutions accordingly. Microsoft has been on the scene for decades – working constantly to keep up with the times and give business users the solutions they truly need.

For Office 365 users, StaffHub is hands down, the no-brainer solution for scheduling. Integration, ease of use, productivity and presentation—what more could a scheduling manager ask for?

Looking to get on top of your scheduling practices? Tired of shift-change nightmares and hardcopy schedules taped up in the breakroom? Reach out to a local team of IT experts for consultation on your best options for schedule management. A team of professionals can help get you on the right path to choosing apps that work better for you and your team.

Microsoft StaffHub

Ohio Fire & Police Hit By Ransomware

Ohio Police Fire Ransomware

Ohio Fire and Police Departments Latest to be Hit by Ransomware Attack

US Secret Service investigates after second ransomware infection in a month

Ohio Police Fire Ransomware

In April of this year, news broke of a devastating ransomware attack at Riverside Fire and Police Department in Ohio. The attack halted operations and over ten months’ worth of data relating to active investigations was encrypted by criminals. The emergency service department’s server was said to be infected through malicious correspondence, disguised as a legitimate email fax.

Luckily, in response to the first attack, the Riverside Fire and Police Department did not pay the ransom, setting a great example for other ransomware victims across the country. The emergency service departments managed to recover most of the critical data from existing backups and public court records. However, the extent of the attack left the Fire and Police departments unable to restore their systems completely.

Doubling Down: Riverside Fire and Police Department Gets Hit by Second Virus

Even worse? The cybersecurity trouble didn’t stop there for the Riverside Fire and Police Department. Less than a month after the initial attack – just as the departments were getting their bearings –cybercriminals struck again and infected Fire and Police servers with a second ransomware outbreak. However, since the departments were on guard from the first attack, their team was more prepared to respond to the second infection.

News of the second attack broke in early May when the US Secret Service was summoned to Ohio to lead a cybercrime investigation. Luckily, department officials had learned from the first attack and had begun backing up data daily. Thanks to this proactivity, the second attack was only able to hold about eight hours of work hostage and the Fire and Police Department was able to recover quickly and fully after the second attack.

However, just because the second attack wasn’t as bad, doesn’t mean it didn’t have a negative effect on productivity at the emergency services department. City Manager, Mark Carpenter claims that though more proactive backup measures had been taken, rebounding from the attack still resulted in redundancies.

“Everything was backed-up,” Carpenter said in an interview. “But we lost about eight hours’ worth of information we have to re-enter. It was our police and fire records, so we just need to re-enter the reports.”

US Secret Service agents are taking the attack very seriously, commencing an extensive investigation. Secret Service agents hope to determine specific points of entry – not just for this attack but for the initial attack as well. The investigation will hopefully uncover critical clues that will help officials track down and stop the hackers once and for all.

A Startling Reminder: No One’s Digital Data is 100% Safe!

These repeat attacks on the Riverside Fire and Police Department serve as a critical reminder that emergency service departments are increasingly becoming victims of ransomware attacks and data loss. In fact, many recent ransomware attacks on emergency service departments have been more devastating than this year’s attack in Riverside. Last year, the Cockrell Hill Police Department in Texas was hit with a massive ransomware attack, resulting in the loss of nearly eight years’ worth of investigation data and evidence.

It doesn’t stop there either. Recent attacks on emergency service departments have been reported across the country. Most recent reports include attacks in Illinois, Massachusetts, Oregon, South Carolina, as well as additional attacks in Ohio and countless others from coast to coast.

However, it must be noted that there’s no evidence to suggest that cybercriminals are specifically targeting emergency service departments. Rather, these attacks do suggest that the bad guys are attempting to deploy more enormous and wide-reaching phishing campaigns in hopes of hitting as many targets as possible. Using manipulative social engineering strategies on a large pool of potential victims, improves the chances of duping targets and infecting as many servers as possible.

If Cyber Criminals Can Breach a Police Station, How Safe is Your Company Data?

While emergency service departments are often able to bounce back quickly – thanks to reliable backups or quietly paying off ransoms – this increase of ransomware attacks emphasizes the need for security awareness training, even for the most seasoned of investigative departments. More importantly, these attacks also serve as a crucial reminder for everyday business professionals. If police and fire departments are falling victim to ransomware attacks, even with the best firewall and cybersecurity measures in place, regular business owners should be on much higher alert.

No matter how extensive your company’s cybersecurity efforts may be, phishing attacks are increasingly being designed to sneak past filters and firewalls. Therefore, getting proactive must be prioritized in your cybersecurity toolkit. Phishing scams are now the most common and effective mode of malware attack and in turn, training your frontline workers to identify these attacks right away and respond to them effectively is critical to keeping your data safe.

Security awareness training is often cited as the best means of preparing front-line tech users to identify and respond to malicious cyberattacks. After all, an informed and vigilant team is a business’ best defense in an increasingly hostile and sophisticated cybercrime climate.

Preparing for the Worst-Case Scenario: What is Security Awareness Training?

Security awareness training isn’t just about reading up on the latest attacks and teaching your team the definitions of phishing, malware, and ransomware. Truly proactive security awareness training involves detailed and interactive modules that help users get a hands-on experience. This includes throwing your team into realistic attack simulations to help them identify red flags and respond with finesse.

So how do you ensure the training you’re providing to your team is up to snuff? Consult or partner with an expert in cyber security. Today’s managed IT service providers are current on the latest cyber-threats. They can assess your current security to see if it’s powerful enough to stop all attacks. In addition, a good IT professional will recommend customized security solutions that can fortify your organization against the ongoing attacks. As the world moves forward, protecting our priceless data is fast-becoming a number one priority.

Did You Know? Your DNA Can Be Hacked!

DNA Hacked

Cyber Hacks on DNA-Testing Companies Raise Fears about Genetic Data Privacy  

DNA-testing companies the latest to be targeted by cybercriminals

DNA Hacked

Stories of businesses getting hacked by cybercriminals are pretty much par for the course nowadays. Increasingly, companies who collect and store large amounts of user data are prime targets for malicious and greedy hackers. From social networking sites to ride-share companies, large stores of user data are one of the hottest commodities on the cybercrime market.

MyHeritage hack: Over 90 million users affected

One of the most recently reported attacks saw the email addresses and passwords of roughly 92 million users hacked. MyHeritage – an international company based out of Israel – is a DNA testing provider that offers customers the unique experience of determining the specific makeup of their ethnic ancestry and lineage. The MyHeritage hack stands out among others for the very obvious fact that the company doesn’t simply collect basic user info like emails and passwords – it collects and stores mass amounts of genetic DNA from subscribers.

Now, it must be noted that the MyHeritage attack only saw the theft of user emails and passwords. According to the company, none of the genetic data and DNA information provided by customers was compromised. Nonetheless, the attack serves as a critical reminder that nearly any kind of data stored on servers is at risk of being hacked.

The hack – which occurred in October of 2017 – was only identified and reported to the company by a security researcher seven months later in early June of this year. With about 92 million users affected, MyHeritage has been in damage control mode ever since. While representatives for the company claim there is no evidence to suggest the attack was malicious, they’ve admitted they can’t know for sure.

No genetic data affected, but can it be protected? 

It’s important to remember that none of the genetic data collected by MyHeritage was hacked. In fact, most genetic data is stored separately and organized anonymously using a numbered barcode system. However, as cybercriminals continue to become more sophisticated and as user data becomes more valuable, companies will be required to work harder to keep even seemingly secure data safe. Especially when the data being collected includes genetic profiles of users.

MyHeritage has been taking steps to tighten cybersecurity protocols and increase user-controls and account security settings. A forced password change for the nearly 100 million affected users arrived by email. Additionally, the company has facilitated two-step verification controls to ensure user logins are better managed. However, some experts argue that this could have been set-up proactively to mitigate hack risks ahead of time.

Rob Verger, the Assistant Tech Editor at Popular Science Magazine raised a valid point in a recent interview. “If they can’t protect user data,” Verger said, “what makes them able to protect the genetic data?”

Going digital: Balancing benefits with risk in the modern marketplace

There’s a balancing act to be done when considering cases like these. There’s no denying that the electronic storage of data has been an asset – especially to the health and sciences industry. Doctors across the nation are making moves to paperless Electronic Medical Record (EMR) systems that make the patient experience more efficient and organized. Genetic testing companies have been revolutionary in their ability to efficiently and privately connect customers with priceless genetic information.

So how do you know when to draw the line? How can individual consumers reap the benefits of these technologies without leaving themselves open to invasions of privacy? According to Verger, the best strategy when giving out personal data is caution and a second thought.

“People should be careful about the types of information they give these services,” Verger said. “If your biggest nightmare is having your email address all the way to your ethnic history being hacked, then you shouldn’t subscribe to these companies or provide data.”

At the end of the day, what matters most is how the users were affected and how MyHeritage responded. When it comes down to it, users have a right to be wary. Not only about the attack, but also about the incredibly long time it took for the hack to be identified and disclosed to users.

Identification by a security researcher, seven months after the fact is hardly what anyone would call a vigilant cybersecurity effort. While MyHeritage is doing their best to rectify the situation and beef up security efforts, the doubt caused by the hack is understandably unsettling for affected users and potential consumers everywhere.

Walking the tightrope in an increasingly digital world

It’s no secret that today’s cyber-climate is more populated, dynamic, and personalized than ever before. The efficiency and customization that the online market offers are unparalleled. However, there is an underside to all this innovation that must be remembered. Service providers and their advertising teams are constantly looking for the most dynamic and personalized ways to advertise to their target markets in these online spaces.

This means collecting as much data on their consumers as possible and at whatever cost. Consumer’s digital fingerprints are increasingly valuable to companies across the digital market. If a company wants to get a consumer’s attention on the information highway, they know they need to personalize the experience as much as possible. This means that all the bits of data entered into your browser become fingerprints to help identify and sell to you.

In this competitive climate, genetic testing companies face an increased risk simply because of the personal nature of the data they collect. Having the genetic makeup of over 90 million consumers is an advertising goldmine, not to mention other potentially dangerous motivations of more malicious hackers. The bottom line? Users need to think twice and be vigilant about the data they choose to share.

“It’s a double-edged sword – EMR and genetic testing can help medicine,” Verger reiterates. “However, nothing out there is perfect,” Verger claims. “Things kept on servers can possibly be hacked or compromised and we need to remember that.”

Trying to find the right balance of technology risks and benefits? Wondering how to keep your organization current without succumbing to increased risk? Reach out to a team of seasoned IT security professionals.  

A strategic IT partner will help improve your IT while managing and mitigating risk at the same time. You can have the best of both worlds – you just need a strategic partner, willing to walk the tightrope with caution and creativity.

Tech Tip: Microsoft Excel & Power BI

Taking Data Visualization and Collaboration to the Next Level: Excel and Power BI Integration

Data visualization tools are all about helping to make it easier for people to work with their data. An even more important aspect of data visualization is to be able to get real actionable insights into the data you’re working with. The more easily a tool can satisfy both aspects, the better it is for both data handlers and data consumers.

Microsoft Excel is king in this regard. For most users, no other tool comes close to Excel as far as data management is concerned.

If you’re using Microsoft Office 365, you have access to yet another gem: Power BI. This suite of business analytics tools allows you to analyze data, and obtain and share insights in ways that no other tool can.

In essence, this suite of tools is designed to provide users with a 360-degree view of data, with the most important metrics all in one place. Even more amazingly, Power BI updates information in real time and makes it available across all devices.

If you’re using this tool, you can explore the data behind your dashboard with just a single click. Everything is intuitive and guides you to find the answers you need with ease.

Pooling the strength of Excel and Power BI together

While most people think they have to choose whether to use Power BI tools or Excel, the two can be used together to create a powerful combination for any range of data visualization needs.

Notice that the whole idea of Office 365 is to enhance collaboration within the organization. A complete cycle of content creation and collaboration would typically look something like:

  1. Get data,
  2. Analyze the data,
  • Visualize the data,
  1. Publish the data, and;
  2. Collaborate with other teams based on the data.

Normally, teams that use Excel tend to only involve Power BI when it comes to publishing their data. In essence, you can choose to work in the tool you love when using Excel and Power BI together. You can build your data or models, analyze and visualize them using either Excel or the Power BI tools – whichever works better for you – then publish out to Power BI where you can then build really beautiful reports to share with everyone in your enterprise.

Modern BI with Office 365

The modern BI available on Office 365 provides for efficient integration of Excel and Power BI Pro and Power BI Desktop. Different interactions between Power BI Desktop, Power BI Service, Excel Online and Excel Desktop exist that bring all these together in a common interface.

Each component in this interface has a function that complements that of the other.

Excel allows for data analysis in a familiar environment

Unlike most Power BI tools, the majority of the people within organizations are familiar with Excel functionalities. As such, Excel provides not only the flexibility and freedom to connect, shape, and model your data to fit your business needs, but also the familiar interface with which to visualize data for your organization’s teams.

Power BI Pro allows for publishing of reports

These are the BI tools available online that allow you to publish your reports securely to your organization while ensuring their accessibility from anywhere on any device.

Power BI Desktop is handy in building advanced models

This is the desktop-based interface of Power BI that lets you build advanced models, queries, and reports that help visualize your data in a way that can be consumed easily by anyone in your organization. Power BI Desktop is designed to enable visual data exploration and interactive reporting capabilities powered by a freeform canvas for drag-and-drop examination.

With this interface, you can build data models, create reports based on them, and share your work by publishing it out to the cloud-based BI services.

Office 365 brings everything together

This Microsoft service provides the platform that glues all these tools together into a single fabric and makes these interactions possible. On a broader scale, Office 365 allows solid team collaboration at the enterprise level; with real-time teamwork and compliance.

Here’s a sample demo showing a typical flow of data across this Excel- Power BI interface on BI Office 365.

The essence here is to see where each of the tools: Excel, Power BI Service and Power BI Desktop come in – with the SharePoint management tool as a necessary addition.

So, from the demo, different sales teams are working directly on various excel files, putting them together. Analysts then pull in all that data and add their input (behind the scenes/including adding data from other sources) before publishing it to Power BI where the data model will sit.

From there, a designer uses Power BI desktop to create final, typically actionable reports out of the model from the cloud.

Wrap Up

Well, as you can see, this is just a sample demo of what you can achieve by integrating Excel and Power BI tools together. Nonetheless, the key takeaway is the demonstration of just how using these tools in combination can serve to enhance collaboration within your organization.