Please ensure Javascript is enabled for purposes of website accessibility

Business Blog

3 Cyber Security Myths That Can Hurt Your Business

Working amid the ever-changing currents of technology and cyber security, businesses often find themselves entangled in a web of misinformation and outdated ideas. But failing to distinguish between myth and fact can put your business’s security at serious risk.

Based on expert research in the field, including CompTIA’s 2024 global State Of Cybersecurity report, we will debunk three common misconceptions that threaten to derail your success in 2024.

Myth 1: My cyber security is good enough!
Fact: Modern cyber security is about continuous improvement.

Respondents to CompTIA’s survey indicated that one of the most significant challenges to cyber security initiatives today is the belief that “current security is good enough” (39%).…

read more

Big Tech Company Admits It’s Listening

We’ve all suspected our devices are listening to us. How else could the clothing company you just told your sister about over brunch show up as a targeted ad on your Instagram feed? The tech community has largely denied listening without our permission.

In fact, in 2017, Facebook had to publicly deny that it listens to its users (that’s what they use location services and ad tracking for). But Cox Media Group (CMG), a multibillion-dollar media empire that owns and operates TV and radio stations worldwide, admitted it’s doing just that.

Data Backup/Recovery, IT Security & Support, Virus Protection, Cyber Security Training, IT Support, Data Security, Cyber Security, Data backups, Computer security service in Walnut Creek, California

HOW ARE THEY DOING IT?

404 Media gathered published marketing information from CMG and determined that it uses AI to identify conversations via smart devices – collecting information about our spending behaviors, interests and how we spend our time – to deliver ads to us.…

read more

Passkeys: The Beginning Of The End Of Passwords

In May, Google began rolling out passkeys, calling them “the beginning of the end of the password.” Passwords have been with us since the mid-1960s, decades before computers became mainstream. But with more sophisticated cybercrime attacks, dated password technology does us more harm than good.

According to a survey by AllAboutCookies, 84% of people still use unsafe passwords (like birthdays and pet names), and over half of survey respondents admitted having five or fewer passwords for all their accounts. Sure, we could do better. But these stats are also a testament to how annoying and ineffective passwords are. Google and other major players in the industry believe that passkeys are the “key” to a simpler – and safer – future.…

read more

AI Wants To Help Us Shop: Are We Okay With That?

You’ve probably noticed the little elf helping you around retail stores this year. No, it’s not the teenager at the mall in red-and-white stockings and a felt green hat. It’s AI.

Log in to Amazon, and you’ll see suggested products like winter decorations, novels or toy recommendations for kids. Add that remote controlled car into your cart for your nephew, and you’ll get recommendations for batteries and gift wrapping, too. This is no accident – generative AI uses your past purchases and recent searches to curate this personalized display. At the end of your shopping affair, you can share your experience, which is data fodder for AI to learn and improve your next shopping venture.…

read more

Don’t Let A “Ghost” Prepare Your Tax Return

We have come in contact with many that THINK they are not in a regulated industry. It’s not because regulations and compliance requirements are not there. There is no enforcement so they decide to eat the risk.

Identity theft knows no limits and every year the IRS warn taxpayers to avoid unethical tax return preparers, known as ghost preparers. Ghosting is a form of identity theft that usually occurs on a dead person for monetary gain. Cyber criminals can often get away with ghosting because it can be months after a person dies before entities like credit reporting agencies, the Social Security Administration, and the IRS receive, share or register death records.…

read more

What Your Map Timeline Knows About You

It’s 10 p.m. — do you know where your children are? Google probably does. Thanks to Google Maps’ Timeline feature, the tech company probably knows where your whole family has been – down to the GPS coordinates. The feature was first rolled out in 2015 on Android devices and two years later on Apple, but many people still don’t know how much information the app actually collects. Before you hit the road this holiday season, take a minute to review your privacy settings to see if the risk is worth the benefits.

What Google Map Timeline Can See

With Google Maps Timeline, you can go back to any day and see in detail where you were, when and for how long.…

read more

How To Safely Share Passwords With Employees

If you ask a security professional, you get by the book advice about sharing passwords: “Don’t share passwords.” But we know, in reality, that doesn’t work. Your office might be sharing a single password for apps like SurveyMonkey right now to save cash on buying additional users, and some social media accounts don’t even give you the option to have multiple log-ins. Sharing passwords in your office is sometimes necessary for collaboration, and the best way to do this is by using a password manager. Affordable (some platforms even offer free versions), layered with security and simple to use, password managers are the safest and easiest way to store and share your company’s private passwords.…

read more

Weekly TEK Tip: DO NOT Underestimate Spam & Phishing Scams.

Data Security is just not about computers and servers anymore! In addition, data security is not just for the cyber attack, it’s for any data incident that could happen. These events result in backend rules that have been created by hackers which can result in critical and highly sensitive information to be forwarded to hackers’ mailboxes.

Not understanding cloud providers exposures can put your business at risk. There are layers to security and federal law outlines it well. Don’t leave yourself wide open and DO NOT underestimate spam and phishing scams. These scams have been on the rise and it’s the perfect opportunity for hackers to send e-mails with dangerous malware and viruses.…

read more

TEK Tip

read more

TEK Tip

read more