A recent report published by nCipher confirms what many business owners have known for a long time. Their employees are the weakest link when it comes to data security. The nCipher report, however, adds a disturbing exclamation point to the data with a few details you’re likely to find shocking. …
Welcoming Two New Team Members!
Please join us in welcoming two recent additions to our I.T. Solutions of South Florida family – Mike Gavaghen and Megan Knipper! Mike fills a unique role with us as the Vice President of Management Solutions and Megan is our newest Network Engineer. While their titles are different, Mike and …
New Survey Shows People Still Have Bad Password Habits
For the last several years, industry experts have been sounding the alarm about password security. We’ve known for quite some time that one of the biggest weak spots in corporate security is the fact that employee passwords are notoriously weak. Millions have been spent on security education. Seminars have been …
Scammers Are Using Direct Deposit Requests To Steal Money
Last year, the FBI issued a warning regarding BEC (Business Email Compromise) scams. Unfortunately, security professionals report that those types of scams are increasing in frequency, and worse, the most recent ones come with a disturbing new twist. The latest incarnation of the scam targets employees, seeking to move their …
Most Travelers Are Oblivious To Security Risks During Travel
Over the course of the holiday season this year, more than half of the working adults in the United States will be traveling with one or more of their work devices. Unfortunately, only a tiny fraction of those fully appreciate the data security risks inherent in travel, which is a …
Survey Finds Employees Aren’t Improving Internal Security Practices
SailPoint has recently published some new research that will probably give you a headache, if you’re a business owner. It’s been common knowledge for at least a few years now that employees are a company’s weakest link when it comes to data security. From weak passwords, to using the same …