Zero day attacks sound scary: Should you be concerned?

Zero day attacks sound scary: Should you be concerned?

Zero day exudes a sense of dread.

… like something cataclysmic might happen on zero day. It even makes a nice subtitle for an action movie: Mission Impossible 8—Zero Day.

But in reality, the term is more like one of those signs at work that says “zero days since our last accident,” only it’s closer to “zero days since we’ve known about this security flaw in our software.”

In other words, zero day simply refers to the number of days that a vendor has known about a software bug (zero). A zero day vulnerability is a software bug that is susceptible to attack by a hacker.

(more…)

Developing an acceptable use policy employees will actually read

Developing an acceptable use policy employees will actually read

Inappropriate use of IT systems puts your organization at risk. That’s why you should develop an acceptable use policy (AUP) that defines the ways in which IT resources may and may not be used.

Too often, AUPs are interminable documents filled with technical and legal language that most employees sign after scanning only the first few paragraphs.

This kind of policy apathy might explain why a Kaspersky study of more than 5,000 companies found that 46 percent of cyberattacks resulted from careless or uninformed employees.

To better secure their networks, all organizations must develop an AUP that both informs and engages.

(more…)

What is shadow IT and how should you respond to it?

What is shadow IT and how should you respond to it?

What is shadow IT?

Gartner defines it as “IT devices, software and services outside the ownership or control of IT organizations.”

In other words, shadow IT is technology that employees use without approval, such as downloading a music streaming service to a company laptop or sending a sensitive document through personal email.

But if you ask three random people in business, you’ll probably get a variation on one of the following answers:

Common shadow IT answers

In this article, we’ll look at each of these views and their potential responses.

(more…)

Data mining vs predictive analytics: Which is best for your business?

Data mining vs predictive analytics: Which is best for your business?

Small businesses that use data analytics software are able to transform data into actionable information, allowing them to work smarter rather than harder. But before they can select the best software, companies need to understand the distinction between data mining and predictive analytics and the ways in which these technologies can be leveraged to gain advantage over the competition.
(more…)

What small businesses should consider before outsourcing IT services

What small businesses should consider before outsourcing IT services

You’d hire an attorney to draft legal documents and a CPA to help with the books, so why wouldn’t you hire a managed service provider (MSP) to handle IT?

Well, lots of reasons, actually.

Outsourcing any part of the business comes with risk, but an information technology breakdown can bring operations to a screeching halt, costing the company money and harming its reputation. To avoid making expensive mistakes, small businesses must carefully consider their needs and weigh the risks of outsourcing IT services.

(more…)