June 12th, 2019 by admin
SAN MATEO, CA – May 2019 – MPA Networks, Inc., a leading managed technology solutions provider, helps local businesses protect their networks against growing global attacks. The company’s state-of-the-art cyber security technology and defense...
Read Full Story »
Tags: cyber security, DDoS, encryption, firewall, HTTPS, identity theft, passwords, pharming, phishing, press release, ransomware, security threats, Technology
Posted in: Press Release
November 15th, 2018 by admin
Security for your business is crucial. Everyone knows that, but settling for any old security system won't give you the protection you need against modern-day cybercriminals stealing sensitive data and monitoring operations. MPA offers great network...
Read Full Story »
Tags: malware, passwords, phishing, ransomware, two-factor authentication
Posted in: Cyber and Data Security
June 20th, 2018 by admin
Businesses have more to worry about than ever when it comes to dealing with new forms of cyber-attacks. The shift to a BYOD workplace adds even more challenges to protecting your digital assets. While hardware and software solutions continue to improve...
Read Full Story »
Tags: managed IT services, passwords, phishing, software updates
Posted in: Cyber and Data Security
May 14th, 2018 by admin
Technology improvements have made it easy for employees to get work done on their personal devices from anywhere. However, that freedom comes with additional security risks and requires extra diligence to keep data secure. Safeguarding information is...
Read Full Story »
Tags: BYOD, malware, passwords, phishing, software updates
Posted in: Cyber and Data Security
April 3rd, 2018 by admin
While there's plenty of technology available to keep your business's data protected, the human element is still the most important piece to consider in safeguarding your company's data. Properly training employees to understand and implement data security...
Read Full Story »
Tags: backup and disaster recovery, consulting services, passwords, phishing, tips and tools
Posted in: Cyber and Data Security
March 29th, 2018 by admin
Cyberattacks are a major security concern for any business that uses the Internet. Even if your company doesn't have a website, hackers can go after your email address and business service accounts.
Though they represent one of the more severe risks of...
Read Full Story »
Tags: consulting services, malware, managed IT services, passwords, phishing
Posted in: Cyber and Data Security
February 5th, 2018 by admin
Businesses have a lot to gain by hiring remote employees, including the ability to recruit from a larger talent pool and the potential for less expensive workplace accommodations. However, remote employees introduce new challenges in IT security because...
Read Full Story »
Tags: managed IT services, passwords, software updates
Posted in: Cyber and Data Security, Solutions
October 17th, 2017 by admin
So far, 2017 has been an eventful year for increasing access to password-alternative smartphone and laptop unlocking techniques. Notably, Samsung added Face unlocking to the Galaxy S8 line and Apple introduced Face ID on the iPhone X. Of particular note,...
Read Full Story »
Tags: BYOD, consulting services, passwords
Posted in: Cyber and Data Security, Hardware and Software
August 1st, 2017 by admin
Hijacked accounts are an IT security nightmare, so it makes sense for your company to look at new technology for better ways to keep your digital assets safe. While security professionals are working out new ways to look at what account credentials are,...
Read Full Story »
Tags: passwords, security threats, two-factor authentication
Posted in: Cyber and Data Security, Hardware and Software
July 25th, 2017 by admin
In June 2017, WikiLeaks released secret documents that exposed the tools the CIA uses to infiltrate public and private networks through routers. These documents have shined a light on how easy it is for someone to hack a router.
This begs the question,...
Read Full Story »
Tags: Internet of Things, passwords, security threats, software updates
Posted in: Cyber and Data Security, Hardware and Software
July 11th, 2017 by admin
If your business is using 2-factor authentication, or 2FA, methods to secure your important accounts, you may need to investigate better ways to implement the practice. Security experts widely recommend using 2FA, a system which utilizes a second security...
Read Full Story »
Tags: consulting services, passwords, security threats, two-factor authentication
Posted in: Cyber and Data Security, Hardware and Software
June 27th, 2017 by admin
Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse.
According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised...
Read Full Story »
Tags: backup and disaster recovery, malware, mobile devices, passwords, ransomware, security threats
Posted in: Cyber and Data Security
April 26th, 2017 by admin
Email and social media accounts provide a wealth of cyber security challenges for businesses. Hackers often look for exploits in account operations to steal information and seize control—both of which can be extremely damaging and difficult to combat....
Read Full Story »
Tags: email, financial services, healthcare, law firms, passwords, security threats, tips and tools
Posted in: Cyber and Data Security, Partners and Industries
January 24th, 2017 by admin
Unlike most IT security threats, phishing scams attack the human element instead of the machine element. Phishing scams try to bait a person into exposing confidential information by posing as a legitimate, reputable source, typically by email or phone....
Read Full Story »
Tags: backup and disaster recovery, managed IT services, passwords, phishing, security threats
Posted in: Cyber and Data Security
November 23rd, 2016 by admin
In September 2016, half a billion Yahoo account users received the bad news that their names, email addresses, phone numbers, and security questions were potentially stolen in a 2014 hack.
According to CNET, the Yahoo hack is the largest data breach...
Read Full Story »
Tags: consulting services, email, managed IT services, passwords, phishing, security threats
Posted in: Cyber and Data Security
November 1st, 2016 by admin
As you probably know already, the United States experienced its largest Internet blackout in history on October 21, 2016, when Dyn—a service that handles website domain name routing—got hit with a massive distributed denial of service (DDoS) attack...
Read Full Story »
Tags: DDoS, Internet of Things, malware, passwords, security threats
Posted in: Cyber and Data Security
August 16th, 2016 by admin
Secure passwords and recovery strategies are an essential part of doing business in the digital age—and password manager programs can help streamline the process.
Password managers store and, often, automate login credentials for individuals across...
Read Full Story »
Tags: backup and disaster recovery, consulting services, managed IT services, passwords, security threats
Posted in: Cyber and Data Security
June 1st, 2016 by admin
Being the cyber-security geeks we are, we took great interest in combing through this year's California Data Breach Report, released by the Attorney General's office this past February. The report tabulates data collected from breach incidents which...
Read Full Story »
Tags: backup and disaster recovery, malware, passwords, security threats
Posted in: Cyber and Data Security
March 30th, 2016 by admin
If you think there's a new cyber-threat to worry about every week, you're probably right. The latest vulnerability to send shockwaves through the enterprise security community has been given a rather ominous acronym: DROWN, short for Decrypting RSA...
Read Full Story »
Tags: HTTPS, passwords, security threats, tips and tools
Posted in: Cyber and Data Security
November 24th, 2015 by admin
Earlier this year, the U.S. government revealed a massive cyber security breach which may well bump the infamous Target and Sony attacks down to "small potatoes." The database of the Office of Personnel Management (OPM)—essentially a central HR...
Read Full Story »
Tags: biometrics, identity theft, passwords, security threats
Posted in: Cyber and Data Security
October 20th, 2015 by admin
The well-publicized recent hack of the Ashley Madison website will probably earn a spot in a "Hacking Hall of Shame"—alongside the infamous Sony and Target breaches—for the sheer amount of grief it may cause millions of marriages. Most of the...
Read Full Story »
Tags: encryption, managed IT services, passwords, security threats
Posted in: Cyber and Data Security
October 16th, 2015 by admin
Online security breaches can be expensive and productivity-killing events. When a nefarious third party acquires an employee password, it’s no party at all.
Many online businesses have begun using Two-Step Verification, also known as Two-Factor Authentication,...
Read Full Story »
Tags: cloud platform, mobile devices, passwords, security threats, two-factor authentication
Posted in: Cyber and Data Security
March 20th, 2015 by admin
How would you react if your company's next phone bill revealed a major cost spike—to the tune of over $100,000? It's actually happening now to small businesses across the U.S., thanks to international VoIP toll fraud—perhaps the fastest growing cyber-threat...
Read Full Story »
Tags: cost savings, firewall, managed IT services, passwords, security threats, VoIP
Posted in: Cyber and Data Security
April 11th, 2014 by admin
We don't want to inundate you with more background information about the Heartbleed bug (you've been bombarded with it across the internet and daily news since it was announced Tuesday!), but rather outline the critical takeaways and action points you...
Read Full Story »
Tags: passwords, security threats
Posted in: Cyber and Data Security