<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

Fairdinkum Blog

Does Your Business  Have A Plan For The Top 3 IT Issues ?

Posted by Keith Shaffer Jun 16, 2019 9:26:57 AM

Data breaches, hacks and compromised security for companies of all sizes have been news headlines for 2019. It seems like every other week another company’s data has been stolen or being compromised causing businesses to lose millions of dollars. Attacks on your company’s data can be prevented by having an IT plan and securing and backing up your data.

Read More

Topics: Data Breach, Data Protection

The Impact of Covert Impairment on Financial Services Firms

Posted by Keith Shaffer May 20, 2019 7:12:25 AM

You have spent years gaining customer trust. As an Executive Director or Partner, you completely understand Customer Lifetime Value and its impact on your business bottom line. The legalization of marijuana in many states presents a new challenge in protecting your customer data and keeping their trust.

Read More

Topics: Cyber Security, Data Breach, Data Protection, Financial

What You Need to Learn from the Biggest Data Breaches in 2018

Posted by Keith Shaffer Mar 8, 2019 3:58:58 PM


Read More

Topics: Security Training and Awareness, Data Breach, Data Protection

Criteria for Evaluating EMM/ MDM Solutions for Nonprofits

Posted by Keith Shaffer Feb 25, 2019 4:10:06 PM

Enterprise Mobility Management (EMM)/ MDM

Read More

Topics: Network Safety, Enterprise Mobility Management (EMM), Data Breach, Non Profit

Data Breach Scenario: Malicious Software - Financial Services Firms

Posted by Keith Shaffer Nov 13, 2018 4:00:11 PM

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article, we will focus on the malicious software that makes institutions vulnerable.

Read More

Topics: Cloud Computing, Cyber Security, Network Safety, Malicious Software, Data Breach