Technology Articles from MPA Networks

MPA Networks, Inc.’s Cyber Security Technology Helps Local Businesses Protect Their Networks Against Global Attacks

June 12th, 2019 by admin

Password protection security

SAN MATEO, CA – May 2019 – MPA Networks, Inc., a leading managed technology solutions provider, helps local businesses protect their networks against growing global attacks. The company’s state-of-the-art cyber security technology and defense...

Read Full Story »

Posted in: Press Release

Identifying the Top 4 Network Security Risks

November 15th, 2018 by admin

Shadowy Figure Overlayed with Digital Code on Dark Background

Security for your business is crucial. Everyone knows that, but settling for any old security system won't give you the protection you need against modern-day cybercriminals stealing sensitive data and monitoring operations. MPA offers great network...

Read Full Story »

Posted in: Cyber and Data Security

Key Strategies to Boost IT Security in the Workplace

June 20th, 2018 by admin

Businesses have more to worry about than ever when it comes to dealing with new forms of cyber-attacks. The shift to a BYOD workplace adds even more challenges to protecting your digital assets. While hardware and software solutions continue to improve...

Read Full Story »

Posted in: Cyber and Data Security

7 Ways to Keep Work Secure on Employee Personal Devices

May 14th, 2018 by admin

Blond-haired business man looking at mobile phone while leaning against a window

Technology improvements have made it easy for employees to get work done on their personal devices from anywhere. However, that freedom comes with additional security risks and requires extra diligence to keep data secure. Safeguarding information is...

Read Full Story »

Posted in: Cyber and Data Security

Training Employees in Data Security Practices: Tips and Topics

April 3rd, 2018 by admin

Two women working together in an office, in front of an Apple monitor

While there's plenty of technology available to keep your business's data protected, the human element is still the most important piece to consider in safeguarding your company's data. Properly training employees to understand and implement data security...

Read Full Story »

Posted in: Cyber and Data Security

10 Cyberattacks Your Business Should Defend Against

March 29th, 2018 by admin

Two CCTV security cameras on a pole with a blue sky behind them

Cyberattacks are a major security concern for any business that uses the Internet. Even if your company doesn't have a website, hackers can go after your email address and business service accounts. Though they represent one of the more severe risks of...

Read Full Story »

Posted in: Cyber and Data Security

5 Specific IT Considerations for Remote Employees

February 5th, 2018 by admin

White-bloused businesswoman using a slim laptop on a birch colored desk

Businesses have a lot to gain by hiring remote employees, including the ability to recruit from a larger talent pool and the potential for less expensive workplace accommodations. However, remote employees introduce new challenges in IT security because...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

Alternative Employee Device Security: Fingerprints, Facial Recognition, and Iris Scans, Oh My!

October 17th, 2017 by admin

Stylized magnifying glass resting on three oversized fingerprints

So far, 2017 has been an eventful year for increasing access to password-alternative smartphone and laptop unlocking techniques. Notably, Samsung added Face unlocking to the Galaxy S8 line and Apple introduced Face ID on the iPhone X. Of particular note,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Looking at USB/NFC Keys for Extra Account Security

August 1st, 2017 by admin

White security icon spotlighted on a dark field of colorized programming code

Hijacked accounts are an IT security nightmare, so it makes sense for your company to look at new technology for better ways to keep your digital assets safe. While security professionals are working out new ways to look at what account credentials are,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Is Your Office Router Secure?

July 25th, 2017 by admin

Netgear ProSafe GS108T router with 4 ethernet cables plugged into it

In June 2017, WikiLeaks released secret documents that exposed the tools the CIA uses to infiltrate public and private networks through routers. These documents have shined a light on how easy it is for someone to hack a router. This begs the question,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Flaws in 2-Factor Authentication Methods Could Leave You Vulnerable

July 11th, 2017 by admin

Close up of a businessman holding a Microsoft smartphone in his hands

If your business is using 2-factor authentication, or 2FA, methods to secure your important accounts, you may need to investigate better ways to implement the practice. Security experts widely recommend using 2FA, a system which utilizes a second security...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

79% of Businesses Were Hacked in 2016. Was Yours One of Them?

June 27th, 2017 by admin

Stylized graphic of a computer monitor with a pane of glass shattering in front of the screen

Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse. According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised...

Read Full Story »

Posted in: Cyber and Data Security

Top 5 Security Tips for Email and Social Media Accounts

April 26th, 2017 by admin

White email envelope icon with several red, pink, and gray circles behind it

Email and social media accounts provide a wealth of cyber security challenges for businesses. Hackers often look for exploits in account operations to steal information and seize control—both of which can be extremely damaging and difficult to combat....

Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries

An Expert's Guide to Avoiding Phishing Scams

January 24th, 2017 by admin

White security lock icon spotlighted on a dark field with a background of programming code

Unlike most IT security threats, phishing scams attack the human element instead of the machine element. Phishing scams try to bait a person into exposing confidential information by posing as a legitimate, reputable source, typically by email or phone....

Read Full Story »

Posted in: Cyber and Data Security

Hack of 500 Million Yahoo Accounts Reminds Industry to Increase Security Measures

November 23rd, 2016 by admin

User name and password dialog box

In September 2016, half a billion Yahoo account users received the bad news that their names, email addresses, phone numbers, and security questions were potentially stolen in a 2014 hack. According to CNET, the Yahoo hack is the largest data breach...

Read Full Story »

Posted in: Cyber and Data Security

Massive IoT DDoS Attack Causes Widespread Internet Outages. Are Your Devices Secured?

November 1st, 2016 by admin

Finger touching a field of icons against a pale blue background

As you probably know already, the United States experienced its largest Internet blackout in history on October 21, 2016, when Dyn—a service that handles website domain name routing—got hit with a massive distributed denial of service (DDoS) attack...

Read Full Story »

Posted in: Cyber and Data Security

Password Managers and Recovery Strategies

August 16th, 2016 by admin

Computer sign in dialog box ***@*******.com

Secure passwords and recovery strategies are an essential part of doing business in the digital age—and password manager programs can help streamline the process. Password managers store and, often, automate login credentials for individuals across...

Read Full Story »

Posted in: Cyber and Data Security

Data Breaches: Dark Times in the Golden State?

June 1st, 2016 by admin

Four brightly colored locks intertwined together in a square shape

Being the cyber-security geeks we are, we took great interest in combing through this year's California Data Breach Report, released by the Attorney General's office this past February. The report tabulates data collected from breach incidents which...

Read Full Story »

Posted in: Cyber and Data Security

The Latest Big Cyber-Threat: Are Your Servers “DROWN-proof”?

March 30th, 2016 by admin

Life preserver in alternating red and white colors, hanging on a wooden wall

If you think there's a new cyber-threat to worry about every week, you're probably right. The latest vulnerability to send shockwaves through the enterprise security community has been given a rather ominous acronym: DROWN, short for Decrypting RSA...

Read Full Story »

Posted in: Cyber and Data Security

The Future of Fingerprint Authentication… Is There One?

November 24th, 2015 by admin

Stylized close-up of a fingerprint

Earlier this year, the U.S. government revealed a massive cyber security breach which may well bump the infamous Target and Sony attacks down to "small potatoes." The database of the Office of Personnel Management (OPM)—essentially a central HR...

Read Full Story »

Posted in: Cyber and Data Security

Lessons of Ashley Madison: How “Crackable” Are Your Passwords?

October 20th, 2015 by admin

Close up of a keyboard with one key labeled 'safe' in red and blue

The well-publicized recent hack of the Ashley Madison website will probably earn a spot in a "Hacking Hall of Shame"—alongside the infamous Sony and Target breaches—for the sheer amount of grief it may cause millions of marriages. Most of the...

Read Full Story »

Posted in: Cyber and Data Security

3 Incredible Benefits of Protecting Your Cloud Data with Two-Step Verification

October 16th, 2015 by admin

Cartoon graphic of a yellow padlock with a white number '2' overlaid

Online security breaches can be expensive and productivity-killing events. When a nefarious third party acquires an employee password, it’s no party at all. Many online businesses have begun using Two-Step Verification, also known as Two-Factor Authentication,...

Read Full Story »

Posted in: Cyber and Data Security

The $100,000 Phone Bill: Is Your Office VoIP Phone System the Next Target?

March 20th, 2015 by admin

Wireframe graphic of a desktop business phone

How would you react if your company's next phone bill revealed a major cost spike—to the tune of over $100,000? It's actually happening now to small businesses across the U.S., thanks to international VoIP toll fraud—perhaps the fastest growing cyber-threat...

Read Full Story »

Posted in: Cyber and Data Security

Critical Action Points to Protect Yourself from Heartbleed Bug Vulnerability

April 11th, 2014 by admin

Oblique angle of a website URL address with a red, bleeding heart icon around the secure lock

We don't want to inundate you with more background information about the Heartbleed bug (you've been bombarded with it across the internet and daily news since it was announced Tuesday!), but rather outline the critical takeaways and action points you...

Read Full Story »

Posted in: Cyber and Data Security