<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

OUR BLOG

Is It Time For A Network Security Audit?

Posted by Gabrielle D'Andrea on Jun 7, 2018 12:28:31 PM

What is a security audit and how often should your company issue a routine check?

Just like your annual checkup, it is wise to do the same for your network. Fairdinkum recommends that a company undergo a routine security audit once every quarter.

If you don't know where to start, start here by checking out our security audit checklist below!

Click Here To Download Your Security Audit Checklist!

How to Identify a Phishing Email

Before you open that very legitimate-looking email, I just want you to pause a second. If you don’t know already, phishing is an attack via e-mail that aims to gather your personal information. Whether it be passwords, account numbers, pins or social security numbers– you do not want that information in the wrong hands. The goal of this email is to look legitimate enough that you don’t see any concern in opening it. Over the years, people have become more savvy in spotting suspicious emails, but as we get smarter, so do hackers.
Faridinkum Cybersecurity package_phishing

What you don't know about Ransomware

Ransomware is a type of malware that quite literally holds your data for ransom until you pay a fine. Malware (short for malicious software) refers to any software used to gain access to a computer or network with the intent to gather private information or disrupt operations. There are many types of Malware, but ransomware is among the most common, in part because you often do most of the work.
Fairdinkum Cybersecurity package_password

Cybersecurity And Mobile Devices In Business

86 percent of employees access company emails via their mobile devices.

 With smartphone penetration at an all-time high, mobile device sare one of the most susceptible mediums that hackers target for cyberattacks. Nearly every individual has a smartphone with them at all times. Throughout a normal day, a smartphone user is exposed to many networks; this includes unprotected WIFI networks, hotspots and more. When a user connects to an unprotected network, their data can be easily accessed. Additionally, smartphones are one of the most valuable assets. If a person unlocks a person’s smartphone, they can get access to sensitive information like credit cards, IDs, emails and passwords for all their websites.

 

Related Articles:

Criteria for Evaluating EMM/ MDM Solutions

 

 

Topics: Cyber Security, Security Training and Awareness, Network Safety