Cybersecurity Archives | Page 2 of 2 | Boost IT : Managed IT | Security | Cloud

  • Home
  • /
  • Cybersecurity
  • ALERT! Badlock Bug in Windows

    Badlock Bug On April 12th, 2016, a crucial security bug in Windows and Samba will be disclosed. We call it: the Badlock bug. Engineers at Microsoft and the Samba Team are working together to get this problem fixed. Patches will be released on April 12th. Admins and all of you responsible for Windows or Samba server infrastructure: Mark the date. (Again: […]

    Read More
  • The Best Anti-Virus Solution

    Cloud-Based Anti-Virus Benefits So which type of anti-virus software is best for your network? Not surprisingly, there’s no shortage of available solutions in today’s market – and there are some tried and trusted tools out there that have worked well for years. But as is the case with many software solutions, it’s important to look […]

    Read More
  • Malware Detection, Protection & Removal


    Part 2: Malware Detection, Protection & Removal with Antivirus & Security Software With your users adopting this safer, preventative behavior, the chances of being attacked by malware are slimmer, but not impossible. To minimize the volume of threats that reach your clients’ network, strengthen your remote monitoring and management (RMM) solution with a solid firewall, anti-malware and […]

    Read More
  • Protect Yourself and Clients From Malware

    Virus Malware Alert

    Malware Alert!!! “Attention! We’ve detected malicious activity on your computer. Download antivirus now.” Spyware, Keyloggers, Scareware (described in example above), Ransomware and more. It seems like malware, or malicious software, lurks around every corner of the Internet, be it in a threatening email attachment or false online advertisement. There are now newer, subtler ways for […]

    Read More
  • 6 Steps to Avoid HIPAA Fines

    Avoid HIPAA Fines

    In 2016 we will see more HIPAA audits and increased HIPAA fines. In 2015, there were 10 times more audits than in the last 10 years combined and currently 70% of healthcare organizations would fail an audit. This article in Healthcare IT News is an indication of what’s coming. Here are the 6 Steps to […]

    Read More
  • HIPAA Compliance Assessment and Risk Analysis

    Avoid HIPAA Fines

    HIPAA Compliance Assessment and Risk Analysis The HIPAA assessment can include documentation for a number of different modules.  There is a link to download a FREE HIPAA Assessment tool below. HIPAA Policies & Procedures The Policy and Procedures are the best practices that our industry experts have formulated to comply with the technical requirements of […]

    Read More
  • 4 Reasons Hackers Love to Target Small Businesses

    Network Security

    Hackers Love to Target Small Businesses October is Cybersecurity Month! Some businesses think that they’re immune to hacking attacks because they’re “low profile” compared to large corporations. However, the truth of the matter is that your organization is just as much at risk as they are. This month, take measures to keep your organization’s data safe, […]

    Read More
  • How Our Endpoint Protection Software Saved Payroll

    How Our Endpoint Protection Software Saved Payroll Below is an e-mail we just sent to one of our clients. The person we sent this e-mail to uses a computer that contains sensitive financial and personal data and is used for payroll.  We are all very thankful for the endpoint protection software. Suzanne,   Just wanted to keep […]

    Read More
  • Security Breach Report 2014

    Security Breach Report 2014 Breaches Doubled in 2014, Financial Losses up 34% The security breach report showed that security breaches doubled in 2014, are on the rise, and it is no surprise to find that as the number of information security incidents continues to mount, so do financial losses. The 2014 Verizon Data Breach Investigations Report (DBIR) […]

    Read More
  • How Was Anthem Hacked?

    How Was Anthem Hacked? And How You Protect Yourself and Your Business It was Malware & other Tools I’m sure you’ve heard Anthem was hacked (Blue Cross Blue Shield), and we’ve been asked numerous times “How Was Anthem Hacked?” According to this Wall Street Journal article, “the Anthem hack relied on malware and tools that have been used […]

    Read More
  • Cybersecurity Tips for SMBs : Part IV (Security Patches & Updates)

    Cybersecurity Tips for SMBs (Security Patches & Updates) Part IV : Aren’t Security Patches & Updates Done Automatically? This is the forth post in a series of cybersecurity tips to secure your network.  Here are the first 3. Cybersecurity Tips for SMBs : Part I (Anti-Malware Software) Cybersecurity Tips for SMB : Part II (Firewall Solutions)  Cybersecurity […]

    Read More
  • The Value of a Hacked PC

    The Value of a Hacked PC Why a Hacker wants ANY PC The question we often hear is “I don’t bank online. I don’t store sensitive information on my machine. I only use it to check email. What could hackers possibly want with my PC?” We sit down with potential or existing clients all the time to […]

    Read More
  • Cybersecurity Tips for SMBs : Part III (Still Need Anti-Virus)

    Cybersecurity Tips for SMBs (Anti-Virus Software) Part III : Do I Still Need Anti-Virus Software? This is the third post in a series of cyber security tips.  Here are the first 2. Cybersecurity Tips for SMBs : Part I (Anti-Malware Software) Cybersecurity Tips for SMB : Part II (Firewall Solutions) There are a number of experts and amateurs […]

    Read More
  • Cybersecurity Tips for SMBs : Part II (Firewall Solutions)

    Cybersecurity Tips for SMBs (Firewall Solutions) Part II : Why a Managed Firewall is So Important This is the second post in a series of cybersecurity tips.  Here is the first post. Cybersecurity Tips for SMBs : Part I (Anti-Malware Software) What is a Firewall? A firewall establishes a barrier between a trusted, secure internal network and another […]

    Read More
  • Cybersecurity Tips for SMBs : Part I (Anti-Malware)

    Cybersecurity Tips

    Cybersecurity Tips Part I : Why is Anti-Malware Software so Important? This is the first post in a 4-part series of cybersecurity tips. Links to other posts are below. Malware and Its Impact A Quick Anti-Malware Story A client of ours brought a home computer into their office without our knowledge and connected it to their office network. The computer […]

    Read More
  • 3 Reasons SMBs Need a Firewall

    3 Reasons SMBs Need a Firewall Why it’s foolish to think SMBs aren’t a target We recently sent out an e-mail to a current client because we want them to know why their firewall is so important.  It makes the difference between peace and quiet — and chaos.  Here’s a summary. A firewall is a separate device installed between […]

    Read More
  • HTTPS as SEO Ranking Signal declared by Google

    Google using HTTPS as SEO ranking signal The reason for Google using HTTPS as a SEO ranking signal (SEO=search engine optimization) is they want to make the internet more secure for everyone. What It Means This means that if your web site has an SSL certificate and you see the lock next to your web […]

    Read More
  • SonicWALL firewall vulnerability

    Our engineering team was just configuring some SonicWALL firewalls that we manage for clients and we came across a SonicWALL firewall vulnerability worth sharing. SonicWALL firewalls have the ability to be managed via command line interface (CLI) over SSH. Two of the primary benefits for an IT group to manage them like this are speed […]

    Read More
  • Page 2 of 2

Our quick IT Self-Assessment will tell you how your business stacks up to industry best practices.

Take the Self-Assessment NOW