MPA Networks Knows Security

January 29th, 2019 by admin

Your business needs a dependable and robust cybersecurity solution, plain and simple. As technology continues to advance and new threats are coming to the forefront, it is essential to have the proper security and management behind you to ensure that your operations, data, and networks do not fall...
Read Full Story »

Posted in: Cyber and Data Security,

Cyber-Security Brings Peace of Mind to Business Owners and their IT Networks

January 4th, 2019 by admin

San Mateo, CA – We are excited to announce the launch of an awareness campaign on recent advancements in cyber security. As technology has become even more central to business operations, hackers have grown in proficiency and are posing several new threats to business owners. We are actively...
Read Full Story »

Posted in: Cyber and Data Security,

Identifying the Top 4 Network Security Risks

November 15th, 2018 by admin

Security for your business is crucial. Everyone knows that, but settling for any old security system won't give you the protection you need against modern-day cybercriminals stealing sensitive data and monitoring operations. MPA offers great network security solutions for your business, no matter the...
Read Full Story »

Posted in: Cyber and Data Security,

Managing Automatic Updates: Balancing Security With Convenience

July 10th, 2018 by admin

Running automatic updates for applications and operating systems helps protect your company's digital devices, but those updates can harm productivity if not well managed. Unpatched software is the single biggest security risk in the workplace, so it's essential to get those updates installed as soon...
Read Full Story »

Posted in: Cyber and Data Security,

3 Steps to Getting Your Business BYOD Ready

July 3rd, 2018 by admin

If your business is considering a Bring Your Own Device environment, there's a great deal of security preparation work to do beforehand. A successful BYOD strategy and BYOD policy is all about finding the sweet spot of control, where your business is able to protect itself from digital threats while...
Read Full Story »

Posted in: Cyber and Data Security,

Making the Switch to BYOD? Pros, Cons and Security Implications to Consider First

June 26th, 2018 by admin

Making the switch to a Bring Your Own Device (BYOD) business environment extends well beyond the decision to let employees choose their devices. Your business should look at the pros and cons of the concept before deciding how to approach it and to what extent your company will embrace it. Your business...
Read Full Story »

Posted in: Cyber and Data Security,

Key Strategies to Boost IT Security in the Workplace

June 20th, 2018 by admin

Businesses have more to worry about than ever when it comes to dealing with new forms of cyber-attacks. The shift to a BYOD workplace adds even more challenges to protecting your digital assets. While hardware and software solutions continue to improve as a first line of defense against nefarious IT...
Read Full Story »

Posted in: Cyber and Data Security,

Unique IT Challenges Financial Services Providers Face Today

June 19th, 2018 by admin

Financial services providers find their IT challenges list is always growing because of security issues, employee needs, customer protection, regulatory laws and business requirements. Keeping up with IT concerns is important not just because failing to do so means lost business opportunities — but also,...
Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries,

What Nonprofits Should Seek in an IT Provider

May 29th, 2018 by admin

While many of the technical needs at nonprofit and for-profit businesses overlap, there are still several key considerations for nonprofits looking for the right IT services provider. Nonprofits' motivations may be driven less by the concept of "spending money to making money" and more toward avoiding...
Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries,

Which Industries Are Most Likely to be Targeted with Cyber Security Threats?

May 21st, 2018 by admin

To understand why some industries are targeted in cyber attacks more often than others, it's important to understand what drives hackers and what makes a target appealing. Of the two, hackers are easier to understand: According to a Verizon data security report, roughly 70 percent of attacks are financially...
Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries,

7 Ways to Keep Work Secure on Employee Personal Devices

May 14th, 2018 by admin

Technology improvements have made it easy for employees to get work done on their personal devices from anywhere. However, that freedom comes with additional security risks and requires extra diligence to keep data secure. Safeguarding information is a combined process of utilizing technology and educating...
Read Full Story »

Posted in: Cyber and Data Security,

Training Employees in Data Security Practices: Tips and Topics

April 3rd, 2018 by admin

While there's plenty of technology available to keep your business's data protected, the human element is still the most important piece to consider in safeguarding your company's data. Properly training employees to understand and implement data security best practices works best when your business...
Read Full Story »

Posted in: Cyber and Data Security,

10 Cyberattacks Your Business Should Defend Against

March 29th, 2018 by admin

Cyberattacks are a major security concern for any business that uses the Internet. Even if your company doesn't have a website, hackers can go after your email address and business service accounts. Though they represent one of the more severe risks of a cyberattack, a data breach costs an enterprise...
Read Full Story »

Posted in: Cyber and Data Security,

Cybersecurity and C-Level Execs: Protecting Data While On the Go

March 26th, 2018 by admin

While all employees need to be mindful of security, the nature of C-level executives makes them more attractive targets for hackers. That means it's necessary for them to take greater precautions. According to TechRepublic, C-level executives are more vulnerable than other employees because of the mobile...
Read Full Story »

Posted in: Cyber and Data Security,

The Mirai Botnet Returns — and Why You Should be Concerned

March 13th, 2018 by admin

The Mirai botnet refers to a massive-scale network of Linux-running Internet of Things devices turned into remote-controlled bots through a malware infection. Hackers can use the network to run a distributed denial of service, or DDoS, by having the infected devices overwhelm a target with data traffic....
Read Full Story »

Posted in: Cyber and Data Security,

Managing Messaging Tools in Your Office

March 5th, 2018 by admin

When used well, instant messaging tools can increase productivity while offering secure information exchange in your office. Messaging works in business environments because it's less involved than email, easy to queue and fast to respond. Several free and premium messaging systems that vary in both...
Read Full Story »

Posted in: Cyber and Data Security,

5 Commonly Overlooked Workplace IT Disasters

February 28th, 2018 by admin

Because IT staff get so invested in making sure software, networking and security elements are working, they sometimes overlook the human, environmental and contingency planning factors that can invite workplace IT disasters. In many cases, preventative work becomes an afterthought for IT staff who...
Read Full Story »

Posted in: Cyber and Data Security,

Spectre and Meltdown: Valuable Lessons for Your IT Security Team

February 12th, 2018 by admin

At the end of 2017, the world learned about Spectre and Meltdown: two far-reaching security threats that exploit how CPUs work to expose protected information on nearly every recent PC, server and smartphone. Hackers can use these exploits to do things like steal passwords and other protected private...
Read Full Story »

Posted in: Cyber and Data Security,

Do You Have a Crisis Management Plan for a Cyberattack?

February 8th, 2018 by admin

A cyberattack crisis management plan is your business's best defense for minimizing cyberattack damage after technology-based preventative measures have failed. Unfortunately for most businesses, cyberattacks are not a matter of if, but a matter of when. Establishing a crisis management plan can help...
Read Full Story »

Posted in: Cyber and Data Security,

5 Specific IT Considerations for Remote Employees

February 5th, 2018 by admin

Businesses have a lot to gain by hiring remote employees, including the ability to recruit from a larger talent pool and the potential for less expensive workplace accommodations. However, remote employees introduce new challenges in IT security because of the lack of IT centralized IT management. While...
Read Full Story »

Posted in: Cyber and Data Security, Solutions,

Does Fintech Pose a Threat to Cybersecurity at Financial Services Companies?

January 29th, 2018 by admin

Financial services companies should embrace a healthy dose of caution when implementing new fintech in their business. Fintech, or any technological innovation in the financial sector, is not inherently more or less secure than any other new technology, but because it works with substantial sums of money,...
Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries,

Four Security Threats Your Company Could Face in 2018

January 16th, 2018 by admin

Hot off the tail of the massive 2017 Equifax breach that exposed personal information of 143 million customers, businesses are on high alert concerning IT security in 2018. While the IT security industry has been successful in mitigating and cracking down on many common threats, hackers are finding new...
Read Full Story »

Posted in: Cyber and Data Security,

HTTPS: Securely Sending Personal And Private Information

December 28th, 2017 by admin

Avoid costly data security breaches by training your staff to check for secure connections when handling private information on the Internet. Secure Hyper Text Transfer Protocol, or HTTPS, is a technology legal, healthcare, and financial businesses use to protect confidential client information safe...
Read Full Story »

Posted in: Cyber and Data Security,

New Phishing Technique Hijacks Legitimate Conversations

October 24th, 2017 by admin

A new spear phishing technique, being used in a hacking campaign called FreeMilk, takes advantage of a Microsoft Office vulnerability in order to hijack existing email conversations to spread malware to high-profile targets. This new technique phishing technique is particularly bothersome because it...
Read Full Story »

Posted in: Cyber and Data Security,

Alternative Employee Device Security: Fingerprints, Facial Recognition, and Iris Scans, Oh My!

October 17th, 2017 by admin

So far, 2017 has been an eventful year for increasing access to password-alternative smartphone and laptop unlocking techniques. Notably, Samsung added Face unlocking to the Galaxy S8 line and Apple introduced Face ID on the iPhone X. Of particular note, facial recognition is a convenient alternative...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

Equifax Breach: What does it teach us about IT security?

October 3rd, 2017 by admin

The 2017 Equifax hack is teaching a painful lesson about the necessity of businesses keeping up with software patches for IT security and to avoid catastrophic damage. The hack, which resulted in potentially exposing the financial information necessary to steal a person's identity for 143 million U.S....
Read Full Story »

Posted in: Cyber and Data Security,

Flash Drives: A Productivity and Security Guide

September 26th, 2017 by admin

With proper planning, your business can take advantage of USB flash drive technology to increase productivity, while eliminating most of the medium's inherent risk. The USB flash drives likely lying around your business offer excellent opportunities to increase productivity and make workflow easier,...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

When Windows 10 Support Stops

August 22nd, 2017 by admin

In July of 2017, some Windows 10 users received an error message when trying to install the Creators Update, stating, "Windows 10 is no longer supported on this PC." This first-of-its-kind problem stems from an incompatibility with a handful of Intel's Clover Trail CPUs found in some of the earliest...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

The Internal SMB IT Security Threat: Overconfidence In Cyber Security Preparedness

August 15th, 2017 by admin

According to a 2017 published study by Advisen and Experian, one of the biggest threats facing small businesses comes from within, such as overconfidence in the organization's ability to protect itself and recover from cyber security attacks. While businesses in the survey aren't claiming to have exceptional...
Read Full Story »

Posted in: Cyber and Data Security,

Addressing the Unique Ransomware IT Security Issues in Healthcare

August 8th, 2017 by admin

Ransomware, a type of malware that holds a computer hostage and tries to force the victim to pay money to recover access, is a nightmare for any business, but the healthcare industry faces the more severe side of a ransomware attack. The healthcare industry receives a whopping 15 percent of all ransomware...
Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries,

Looking at USB/NFC Keys for Extra Account Security

August 1st, 2017 by admin

Hijacked accounts are an IT security nightmare, so it makes sense for your company to look at new technology for better ways to keep your digital assets safe. While security professionals are working out new ways to look at what account credentials are, sometimes with mixed results like with Samsung's...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

Is Your Office Router Secure?

July 25th, 2017 by admin

In June 2017, WikiLeaks released secret documents that exposed the tools the CIA uses to infiltrate public and private networks through routers. These documents have shined a light on how easy it is for someone to hack a router. This begs the question, are your business’ IT security practices keeping...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

Flaws in 2-Factor Authentication Methods Could Leave You Vulnerable

July 11th, 2017 by admin

If your business is using 2-factor authentication, or 2FA, methods to secure your important accounts, you may need to investigate better ways to implement the practice. Security experts widely recommend using 2FA, a system which utilizes a second security level of authorization in addition to a password...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

79% of Businesses Were Hacked in 2016. Was Yours One of Them?

June 27th, 2017 by admin

Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse. According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised security at least once for 79.2 percent of businesses...
Read Full Story »

Posted in: Cyber and Data Security,

Top 5 Security Tips for Email and Social Media Accounts

April 26th, 2017 by admin

Email and social media accounts provide a wealth of cyber security challenges for businesses. Hackers often look for exploits in account operations to steal information and seize control—both of which can be extremely damaging and difficult to combat. A compromised account is a problem for any business,...
Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries,

Mac- and Linux-Based Malware Targets Biomedical Industry

March 14th, 2017 by admin

The malware infection, discovered in late January, that's been hiding out on Mac and Linux devices for more than two years doesn't mean the security floodgates are open, but it is a reminder that these devices aren't invincible. Apple is calling this new malware "Fruitfly," and it's being used to target...
Read Full Story »

Posted in: Cyber and Data Security,

Digital Sticky Notes: A Time-Saver for Your Entire Team

February 15th, 2017 by admin

It's a familiar sighting in the workplace: the employee with half a dozen sticky notes attached to their computer monitor. While not the most confidential or elegant solution, these employees are on to something. Fortunately, technology has stepped in to embrace this practice and increase productivity...
Read Full Story »

Posted in: Cyber and Data Security,

An Expert's Guide to Avoiding Phishing Scams

January 24th, 2017 by admin

Unlike most IT security threats, phishing scams attack the human element instead of the machine element. Phishing scams try to bait a person into exposing confidential information by posing as a legitimate, reputable source, typically by email or phone. Most often, the culprits seek users' account login...
Read Full Story »

Posted in: Cyber and Data Security,

A Primer on Phishing Attacks

December 21st, 2016 by admin

Phishing attacks are a dangerous and devastating method hackers use to steal personal information and accounts—primarily by striking the user instead of the machine. According to the APWG Phishing Activity Trends Report, the first quarter of 2016 saw an explosive 250 percent increase in phishing attacks,...
Read Full Story »

Posted in: Cyber and Data Security,

Hack of 500 Million Yahoo Accounts Reminds Industry to Increase Security Measures

November 23rd, 2016 by admin

In September 2016, half a billion Yahoo account users received the bad news that their names, email addresses, phone numbers, and security questions were potentially stolen in a 2014 hack. According to CNET, the Yahoo hack is the largest data breach in history. In the wake of a major hack like this...
Read Full Story »

Posted in: Cyber and Data Security,

The Benefits of Backups

November 16th, 2016 by admin

Even seasoned IT pros have made the mistake of not backing up a device—and panicked after losing countless important files because the device failed. We may know better, yes, but that doesn’t mean we’re perfect. On the flip side, we’ve all breathed a sigh of relief when a recent backup of...
Read Full Story »

Posted in: Cyber and Data Security,

Massive IoT DDoS Attack Causes Widespread Internet Outages. Are Your Devices Secured?

November 1st, 2016 by admin

As you probably know already, the United States experienced its largest Internet blackout in history on October 21, 2016, when Dyn—a service that handles website domain name routing—got hit with a massive distributed denial of service (DDoS) attack from compromised Internet of Things (IoT) devices....
Read Full Story »

Posted in: Cyber and Data Security,

Password Managers and Recovery Strategies

August 16th, 2016 by admin

Secure passwords and recovery strategies are an essential part of doing business in the digital age—and password manager programs can help streamline the process. Password managers store and, often, automate login credentials for individuals across all secured online platforms for easy, secure, and...
Read Full Story »

Posted in: Cyber and Data Security,

Don’t Forget About Printer Security

August 9th, 2016 by admin

There was a time when printers—in your office or home—were considered relatively "simple" office equipment: plug it in, connect it to the local network, and keep the ink fresh, and there wasn't much else to worry about. But times have changed. Today's business printers—enterprise-level equipment...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

Defend Your Network Against Advanced Persistent Threats

July 12th, 2016 by admin

If you've looked over our previous posts since we've started our blog, you know how serious we are about protecting your company from everyday cyber-threats—mainly phishing, ransomware, and various other malware. Today we'd like to discuss a different form of cyber-threat plaguing businesses over the...
Read Full Story »

Posted in: Cyber and Data Security,

The “Seven Deadly Sins” of Ransomware

June 29th, 2016 by admin

Readers of our blog over the past few years know we were among the first in the Bay Area to warn our customers about the growing threats of ransomware—from the emergence of CryptoLocker and CryptoWall to our federal government's startling admission that they're virtually powerless to stop it. Mostly...
Read Full Story »

Posted in: Cyber and Data Security,

Where's Your Company's WISP? Why You Need One NOW

June 14th, 2016 by admin

A WISP is one of the most important documents for any company doing business over the Internet—which, in this day and age, is pretty much everybody. Who's responsible for drafting and maintaining your company's WISP? Or are you even sure what a WISP is? If not, your company is already at serious risk...
Read Full Story »

Posted in: Cyber and Data Security,

Data Sanitization: Are You Erasing Your Old PCs COMPLETELY?

June 7th, 2016 by admin

One of our pet peeves with some of our new customers is that once we come in to upgrade their IT network, they're careless about disposing their old hardware—specifically, their PC hard drives. They think that by simply deleting their existing files—email, customer records, and other sensitive or proprietary...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

Data Breaches: Dark Times in the Golden State?

June 1st, 2016 by admin

Being the cyber-security geeks we are, we took great interest in combing through this year's California Data Breach Report, released by the Attorney General's office this past February. The report tabulates data collected from breach incidents which expose confidential information of 500 or more individuals,...
Read Full Story »

Posted in: Cyber and Data Security,

Are Your Smartphones Properly “Containerized”?

April 26th, 2016 by admin

Earlier today the cashier at the local drive-thru miskeyed the amount of cash I gave him into his register. Somewhat sheepishly, he asked if I had a smartphone so I could verify the correct amount of change. Fortunately, I never leave home without it. In fact, how well could you function today without...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

Cybercrime Begins Over the Phone, Too - Don't Let Your Employees Forget

April 19th, 2016 by admin

If you've been a regular reader of our blog, you know we've spent plenty of time discussing phishing, malware, and other cybercrime. It's all part of our modern online world, and we know it will never really go away. We've talked about the tricks scammers use, from links in bogus emails to simply...
Read Full Story »

Posted in: Cyber and Data Security,

The Best Way to Check Your PCs for Malware - Fast and FREE

April 12th, 2016 by admin

A couple months back, we touched on the story of our normally tech-savvy friend who got tricked into allowing his desktop PC to be infected with obvious malware. At first, he had the sickening feeling that comes with a virus-infected computer—but thanks to some quick thinking and online research, he...
Read Full Story »

Posted in: Cyber and Data Security,

Prepare Now or Pay Later: More Ransomware Attacks in the News

April 7th, 2016 by admin

We're only a few months into 2016, but we've already seen two high-profile ransomware attacks—where cyber-crooks heavily encrypt a victim's computer files before demanding payment for a decryption key only they can provide. Two notable incidents grabbed headlines: In January, Israel's Electricity...
Read Full Story »

Posted in: Cyber and Data Security,

The Latest Big Cyber-Threat: Are Your Servers “DROWN-proof”?

March 30th, 2016 by admin

If you think there's a new cyber-threat to worry about every week, you're probably right. The latest vulnerability to send shockwaves through the enterprise security community has been given a rather ominous acronym: DROWN, short for Decrypting RSA with Obsolete and Weakened eNcryption. Publicized...
Read Full Story »

Posted in: Cyber and Data Security,

Are Macs “Ransomware-Proof”? Not Anymore

March 23rd, 2016 by admin

Since Apple famously introduced the Macintosh over three decades ago, Mac users have been confident that their computers are virtually immune to ransomware and other malware threats which plague their Windows counterparts. But those days are over. On March 4, researchers at security firm Palo Alto...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

IoT Devices: Security Holes?

March 15th, 2016 by admin

Hackers can take advantage of a newer technology prevalent throughout your business to break into your network and compromise security: Internet of Things devices. Your business may have never considered that the handy new Smart Thermostats throughout the building or the Smart TV in the conference room...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

iPhone “Backdoor”? It Already Exists! Why Your Company Needs It

March 8th, 2016 by admin

February's big story in the tech world was the conflict between Apple and the FBI over the creation of a "backdoor" to retrieve encrypted data on iPhones. The government is looking for any clue as to what—or, more specifically, who—motivated Syed Farook, along with his wife, to gun down his San Bernardino...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

New Ransomware Good Reminder to Practice Thorough Data Backup

February 17th, 2016 by admin

A new combination of a sophisticated password-stealing Trojan, powerful exploit kit, and content-encrypting ransomware is making its way around the Internet infecting Windows users. If it hits your business, you’re looking at a considerable loss of time and finances. It’s estimated that businesses...
Read Full Story »

Posted in: Cyber and Data Security,

The Dangers of Free Public Wi-Fi: How To Protect Your Network

February 2nd, 2016 by admin

How dependent have you and your employees become on public Wi-Fi outside the office? Mobile hotspots are almost everywhere now—from coffee houses and fast-food restaurants to hotels and airports (and even aboard most planes). Without Wi-Fi access, many of us feel alarmingly "disconnected"—as if...
Read Full Story »

Posted in: Cyber and Data Security,

Ransomware Is Getting Even Worse... and The Feds Can't Stop It

January 21st, 2016 by admin

As chaos reigns across much of the Middle East, our government steadfastly insists that "the United States does not negotiate with terrorists—because it will only encourage them in the future." Meanwhile, visitors to our National Parks are warned never to feed bears and other wildlife—because...
Read Full Story »

Posted in: Cyber and Data Security,

Fake Phishing: The Ultimate Security Training?

January 5th, 2016 by admin

What is the current state of your company's IT security training program—if you have one? Many companies settle for an annual group training session to broadly review the major types of cyber-threats—viruses, malware, and phishing. The problem with once-a-year "standardized" training is that once...
Read Full Story »

Posted in: Cyber and Data Security,

The Future of Fingerprint Authentication… Is There One?

November 24th, 2015 by admin

Earlier this year, the U.S. government revealed a massive cyber security breach which may well bump the infamous Target and Sony attacks down to "small potatoes." The database of the Office of Personnel Management (OPM)—essentially a central HR department for most federal agencies—was hacked multiple...
Read Full Story »

Posted in: Cyber and Data Security,

Email Encryption: The Basics

November 12th, 2015 by admin

Chances are you probably have a few USPS "forever" stamps that have been sitting in your desk drawer for a while. When was the last time you actually used them to "snail mail" something—a bill payment or an important letter? Most bills are paid online these days, and most of our day-to-day correspondence...
Read Full Story »

Posted in: Cyber and Data Security,

Treat Your Network As If It’s ALREADY Been Hacked

November 5th, 2015 by admin

Weak IT security generally revolves around the following theory: "We'll keep hackers out of our network—everything's okay until something bad happens." But strong security operates from an assume breach mindset: The hackers have already infiltrated our network, probably for a while now—where and...
Read Full Story »

Posted in: Cyber and Data Security,

Lessons of Ashley Madison: How “Crackable” Are Your Passwords?

October 20th, 2015 by admin

The well-publicized recent hack of the Ashley Madison website will probably earn a spot in a "Hacking Hall of Shame"—alongside the infamous Sony and Target breaches—for the sheer amount of grief it may cause millions of marriages. Most of the blame lies with the Ashley Madison administrators...
Read Full Story »

Posted in: Cyber and Data Security,

3 Incredible Benefits of Protecting Your Cloud Data with Two-Step Verification

October 16th, 2015 by admin

Online security breaches can be expensive and productivity-killing events. When a nefarious third party acquires an employee password, it’s no party at all. Many online businesses have begun using Two-Step Verification, also known as Two-Factor Authentication, to introduce an extra layer of protection...
Read Full Story »

Posted in: Cyber and Data Security,

The “Redirect to SMB” Bug: New Windows, Same Danger

October 6th, 2015 by admin

The big news out of Microsoft over the past couple of months is the much-ballyhooed release of Windows 10. While “Win10” finally addresses those annoying shortcomings of its predecessor Windows 8 (as we've discussed), it still hasn't corrected a dangerous security flaw known in cybersecurity circles...
Read Full Story »

Posted in: Cyber and Data Security,

What You Don’t Know CAN Hurt You: The Dangers of Shadow IT

September 18th, 2015 by admin

Last spring, Hillary Clinton received a barrage of criticism after it was revealed that she used a private email server during her tenure as Secretary of State—seemingly at odds with government security protocols, if not federal laws. Clinton would go on to publicly dismiss the controversy, saying...
Read Full Story »

Posted in: Cyber and Data Security,

The Importance of Being Proactive: Why You Need A Breach Response Plan

August 6th, 2015 by admin

Each month, Microsoft releases a new security bulletin. In May of 2015, forty-six vulnerabilities had been identified and fixed, spanning products such as Windows, Internet Explorer, and Office. In June, it was even more. While some of these vulnerabilities were low-threat, others were more critical,...
Read Full Story »

Posted in: Cyber and Data Security,

Malvertising: The Next Big Cyber Threat

July 16th, 2015 by admin

We've spent plenty of time here talking about safeguarding your company against phishing and other forms of cyber-attack. As we've discussed, the first line of defense against phishing is to make sure your employees remain vigilant by avoiding email links and shady websites. But there's a bigger threat...
Read Full Story »

Posted in: Cyber and Data Security,

Small Business Disaster Recovery Solutions

July 10th, 2015 by admin

“Disaster”: the word itself is synonymous with trauma. Of course, even after a traumatic event, there is an opportunity to rebuild. Restoring your data is a critical part of rebuilding your infrastructure and your business after a physical or virtual disaster. For businesses, especially small- to medium-sized...
Read Full Story »

Posted in: Cyber and Data Security,

Is Tape Storage (Completely) Dead?

May 28th, 2015 by admin

If you're over 40, you probably remember the original Sony Walkman—the freedom of listening to a single cassette tape in portable stereo. Even if you still have a few favorite cassette tapes packed away somewhere, where could you listen to them today? Tape is just so… ancient. Ask your kids. Magnetic...
Read Full Story »

Posted in: Cyber and Data Security,

Cyber Insurance: Good for my Company?

May 20th, 2015 by admin

We've spent a lot of time on this blog talking about cyber-attacks—from nuisance hacking to data theft to virtual electronic terrorism—and the steps your company can take to defend itself. But what if, despite all your best efforts, you one day discover you've still been hacked? An insurance policy...
Read Full Story »

Posted in: Cyber and Data Security, Solutions,

Know Your Enemy: These New Phishing Schemes are Hard to Spot

April 16th, 2015 by admin

A friend called me recently to gripe about his personal email account. His ISP has done a pretty good job of virtually eliminating the annoying spam he used to receive (remember your inbox way back when?), but now he's the target of two particularly relentless phishing schemes I'd like to share with...
Read Full Story »

Posted in: Cyber and Data Security,

Uncle Sam Won't Stop Cyber-Crime - It's Up To You

April 1st, 2015 by admin

You probably know President Obama recently hosted a high-profile cyber-security summit at Stanford. The basic idea was to discuss how to expand the federal government's role in combating cybercrime against American businesses—from simple theft to outright corporate terrorism. As you'd expect, most of...
Read Full Story »

Posted in: Cyber and Data Security,

The $100,000 Phone Bill: Is Your Office VoIP Phone System the Next Target?

March 20th, 2015 by admin

How would you react if your company's next phone bill revealed a major cost spike—to the tune of over $100,000? It's actually happening now to small businesses across the U.S., thanks to international VoIP toll fraud—perhaps the fastest growing cyber-threat today. While many small companies have adopted...
Read Full Story »

Posted in: Cyber and Data Security,

Watch Out! Protect Your Home and Office against the Internet of Things

January 28th, 2015 by admin

Internet of Things (IoT) devices provide a powerful way to utilize technology to enhance everyday machines in your home or office, from wrist fitness bands to refrigerators to thermostats. The ability to monitor your home security cameras while you’re on vacation, or tell your coffee machine to skip...
Read Full Story »

Posted in: Cyber and Data Security,

'Tis the Season—for Small Business Cybercrime. Here’s How to Protect Your Company

January 7th, 2015 by admin

The holiday season means more than shopping and gift giving. It also now marks prime season for cybercriminals and hackers around the world — and they're coming after small businesses in the U.S. "Targeting" Target—via Small Businesses You may have seen a segment on the November 30 broadcast of 60...
Read Full Story »

Posted in: Cyber and Data Security,

Disaster Recovery: Is Your Data Protected From the Next Catastrophe?

November 6th, 2014 by admin

Last month, the Bay Area commemorated the 25th anniversary of the Loma Prieta earthquake. Those of us who lived through that experience remember the sudden, unexpected jolt — and how the event disrupted our lives for several weeks afterward. Of course, we were a lot less reliant on technology back...
Read Full Story »

Posted in: Cyber and Data Security, Solutions,

Homeland Security Issues Warning Over Serious Internet Explorer Bug

April 30th, 2014 by admin

Serious Security Flaw Found in IE A security flaw or bug has been discovered in Microsoft Internet Explorer (IE), which affects all versions of IE from 6 to 11. This flaw allows a hacker to potentially gain access to your computer and hard drive when a bad link be clicked. At this time, the U.S. Department...
Read Full Story »

Posted in: Cyber and Data Security,

Critical Action Points to Protect Yourself from Heartbleed Bug Vulnerability

April 11th, 2014 by admin

We don't want to inundate you with more background information about the Heartbleed bug (you've been bombarded with it across the internet and daily news since it was announced Tuesday!), but rather outline the critical takeaways and action points you should take right now to protect yourself from possible...
Read Full Story »

Posted in: Cyber and Data Security,

R.I.P. Windows XP. Current Users Now at Greater Cyber Risk

April 8th, 2014 by admin

Microsoft Corporation has just announced it will stop supporting Windows XP, one of the world's most popular and successful operating systems. Though Microsoft XP will not magically disappear from the desktops of anyone currently using it (which is a LOT of people!), Microsoft will stop supporting...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

Beware Email Spoofing! Protect Yourself Now!

April 4th, 2014 by admin

We have recently seen a rise in a disturbing phishing scam called email spoofing. Email Spoofing A spoof email is an email that looks as if it came from a trusted friend or acquaintance, but is actually malicious in nature. These emails are particularly nasty because they really look like they are...
Read Full Story »

Posted in: Cyber and Data Security,

Important IT Security Message for MPA Networks’ Clients

December 19th, 2013 by admin

One Malicious Email Could Cost you Thousands of Dollars and Take Down your Entire Network – Don’t be a Victim; Learn the Facts! Ransomware viruses are on the rise and their explosive growth in the past few months has been startling.  We want to help our clients be up-to-date on this issue and understand...
Read Full Story »

Posted in: Cyber and Data Security,

Quiz Answers - Can you Find the Malicious Email?

December 18th, 2013 by admin

Ready for the answers to our quiz? Drumroll please... Every single email is malicious EXCEPT for this one: “eFax message from “4082459385″. 1 page(s). Caller-ID: 408-245-9385″  -  eFax Yep, that eFax message is 100% legitimate! Now let's discuss why Unless you are an eFax client and know what...
Read Full Story »

Posted in: Cyber and Data Security,

Quiz - Can you Find the Malicious Email?

December 12th, 2013 by admin

Can you Spot the Malicious Emails/s?! After reading through our Cryptolocker and Ransomware blog series and learning how to identify a malicious email, it's time to put your new virus sleuthing skills to the test. Read through the list of email subject lines and from names below.  Which email/s...
Read Full Story »

Posted in: Cyber and Data Security,

How to Identify a Malicious Email

December 4th, 2013 by admin

Continuing our blog series about Cryptolocker and Ransomware virus attacks, it is necessary we explain the basic fundamentals of identifying a malicious email or attachment. Only through education and proper awareness can we effectively avoid Ransomware and other malware attacks. Identifying a...
Read Full Story »

Posted in: Cyber and Data Security,

The Single Most Reliable Method for Preventing a Ransomware Attack

December 3rd, 2013 by admin

Last week, we wrote about the rise of Cryptolocker and Ransomware viruses, the new breed of malware virus infecting host computers through malicious email attachments, and spreading rapidly through its use of commercial-grade RSA encryption and Bitcoin, a universal, virtual currency. Unfortunately,...
Read Full Story »

Posted in: Cyber and Data Security,

Protect your Business from Cyber Threats with this 5 Point Checklist

November 21st, 2013 by admin

About half of all small business owners believe their business is too small to be a potential victim for virtual thieves and hacking. The facts, however, say something quite different. The majority of cyber attacks are actually perpetrated against businesses with fewer than 100 employees. Is your...
Read Full Story »

Posted in: Cyber and Data Security,

Cryptolocker & Ransomware - What You Need to Know

November 15th, 2013 by admin

CryptoLocker CryptoLocker is a new, and particularly malicious, breed of ransomware discovered only a couple months ago. CryptoLocker is a Trojan horse malware that encrypts and restricts access to the infected computer while demanding payment for the recovery and decryption of files, typically...
Read Full Story »

Posted in: Cyber and Data Security,


Back to Top

Copyright © 2019 MPA Networks, Inc.

Atomic8Ball Web Presence Management