-
The Secret to Choosing Unhackable Security Questions
In this video, Cathy Miron provides tips on how to avoid account compromise, identity theft and other scams and by choosing unhackable security questions.
Security questions can help secure your online accounts, but they also require us to reveal fairly personal information about ourselves. If you're not careful when choosing your security questions, you just might be making it easy for scammers to "hack" those security questions.
Have you ever stopped to think about how easy (or not) it is to find the answers to the most common account security questions online? If you were to think like a hacker or Google your own name, just how much could someone find about you through public information, social media profiles, and more? If this scares you into revisiting your security questions and upgrading them with better ones, remember the acronym S.C.A.M.S. and you'll remember the trick to choosing unhackable security questions and answers.
𝐇𝐨𝐰 𝐭𝐨 𝐂𝐫𝐞𝐚𝐭𝐞 𝐔𝐧𝐡𝐚𝐜𝐤𝐚𝐛𝐥𝐞 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬 𝐔𝐬𝐢𝐧𝐠 𝐒.𝐂.𝐀.𝐌.𝐒.
𝗦 - 𝗦𝗽𝗲𝗰𝗶𝗳𝗶𝗰
The answers to the questions you choose must be specific. There should be one, and only one, right answer.
𝗖 - 𝗖𝗼𝗻𝘀𝗶𝘀𝘁𝗲𝗻𝘁
The answers to the question must be consistent, and not vary over time. For example, if you choose “What’s your favorite restaurant?”, that might change over time as you grow older and your palette changes, making this a difficult question to remember correctly every single time.
𝗔 - 𝗔𝗯𝘂𝗻𝗱𝗮𝗻𝘁
The answer choices must be abundant. There should be many possible "right" answers to the question, but still only one true answer. "What is the name of your favorite sibling?" would be a terrible security question, for example.
𝗠 - 𝗠𝗲𝗺𝗼𝗿𝗮𝗯𝗹𝗲
Be sure to choose security questions with memorable answers; something you're not likely to forget, even in 10 or 15 years!
𝗦 - ....... (𝗪𝗮𝘁𝗰𝗵 𝘁𝗵𝗲 𝘃𝗶𝗱𝗲𝗼 𝘁𝗼 𝗳𝗶𝗻𝗱 𝗼𝘂𝘁 𝘁𝗵𝗲 𝗹𝗮𝘀𝘁 𝗼𝗻𝗲!)
It’s a small world, and the internet is a vast resource that makes it easy for anyone to be an amateur sleuth. Bad guys who are out to scam or harm you can easily guess or Google something about you that could compromise your online accounts. Use the acronym S.C.A.M.S., and watch the full video, to learn how to create unhackable security questions and answers, so you can further secure your online accounts.
#cybersecurity #scams #securityquestions
If you'd like to have a confidential conversation about your unique situation, I'm always accessible over here: http://meetcathy.com
--------------------------------
Most successful business owners are not IT pros. They use technology tools every day, but rely on someone else to manage their computers.
You know good cybersecurity and data protection are important, but do you have the right resources and expertise to properly protect your information?
This is where eSilo's data backup and cybersecurity services can help.
Any business can exponentially reduce their risk of a cyberattack or IT failure, and increase their chances of a full and speedy recovery with eSilo's data protection solutions.
Our team of professionals are expertly trained and ready to help you today. Give us a call or visit us online to learn more.
www.eSilo.com | 800-747-9255 | hello@esilo.com
Schedule a FREE Data Protection Audit at www.esilo.com/sales
-------------------------------------------------------------------------------------
𝗝𝗼𝗶𝗻 𝗼𝘂𝗿 𝗚𝗿𝗼𝘂𝗽𝘀 𝗳𝗼𝗿 𝗙𝗿𝗲𝗲 𝗧𝗲𝗰𝗵 & 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗶𝗽𝘀!
LinkedIn 🧑🤝🧑 https://www.linkedin.com/groups/8722123/
Facebook 🧑🤝🧑 https://fb.com/groups/techtipsforsmallbusiness
𝗙𝗼𝗹𝗹𝗼𝘄 𝘂𝘀 𝗼𝗻 𝗦𝗼𝗰𝗶𝗮𝗹
Facebook ➡️ https://www.facebook.com/eSiloDataBackup
LinkedIn ➡️ https://www.linkedin.com/company/esilo/
Twitter ➡️ https://twitter.com/eSiloDataBackup -
Why You Need a Password Manager!
Almost everything these days requires a password and trying to keep track of them all is challenging. In this video, Cathy Miron discusses why you need a password manager and how to create a strong, memorable master password for your password manager.
𝗟𝗲𝘁'𝘀 𝗦𝘁𝗮𝗿𝘁 𝗪𝗶𝘁𝗵 𝘁𝗵𝗲 𝗣𝗿𝗼𝗯𝗹𝗲𝗺
The average person has to juggle over 190 passwords between their work and personal lives online. So many passwords are too easily forgotten, leading to bad practices that put your security and privacy at risk.
Many people default to what's easiest - shorter, easy-to-remember passwords that you then reuse across multiple sites. This creates a vulnerability because if a data breach occurs on any of those sites, your passwords can be leaked on the Dark Web. All a hacker needs to know is one username and password combination to be able to try or guess at other passwords for other sites. Before you know it, one breach can lead to multiple of your online accounts being hacked.
Making sure each of your online accounts has a long, strong, and unique password that can't be easily guessed creates a higher level of security, but it's also nearly impossible to maintain without the help of purpose-built security tools. This is why you need a password manager.
𝗛𝗼𝘄 𝗠𝘂𝗹𝘁𝗶𝗳𝗮𝗰𝘁𝗼𝗿 𝗔𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗛𝗲𝗹𝗽𝘀
But you can't stop at creating complex passwords. Strong passwords alone are no longer good enough to secure your online accounts from hacking, impersonation, or data theft. For that, you also need to turn on an added layer of protection called multifactor authentication.
Multifactor authentication (MFA), requires that you use two or more methods of identification in order to access your online accounts. This means a stolen password is, by itself, not enough to grant a stranger access to your accounts.
MFA codes are sometimes sent via text message or through a secure authentication app on your mobile phone. MFA is also sometimes referred to as two-factor authentication or 2FA, and the concept behind them is the same.
𝗪𝗵𝘆 𝗮 𝗣𝗮𝘀𝘀𝘄𝗼𝗿𝗱 𝗠𝗮𝗻𝗮𝗴𝗲𝗿 𝗜𝘀 𝗜𝗺𝗽𝗼𝗿𝘁𝗮𝗻𝘁
You might be wondering why you need a password manager if you can keep track of your passwords another way - a book, a sticky note, a clever pattern that helps you remember each site's password.
A password manager is a virtual, online vault that keeps and protects your credentials and passwords. It keeps them organized and accessible wherever you are (at home, in the office, or on the go) and can be stored safely encrypted on your computer and/or phone. To access this vault, you need to set a "master password", which is the last password that you must memorize. (𝗪𝗮𝘁𝗰𝗵 𝘁𝗵𝗲 𝘃𝗶𝗱𝗲𝗼 for tips from Cathy on how to select a strong and highly secure master password).
It would be impossible to overstate just how important the security of your online accounts is to your finances, security, privacy and reputation. Hacks might start online, but they have serious real-world consequences Keeping your online accounts safe in a password manager will help you protect this most sensitive account information.
We hope this video helps you understand why everyone needs a password manager, and gives you some tips to consider to get started today.
If you'd like to have a confidential conversation about your unique situation, schedule here at http://meetcathy.com
--------------------------------
Most successful business owners are not IT pros. They use technology tools every day, but rely on someone else to manage their computers.
You know good cybersecurity and data protection are important, but do you have the right resources and expertise to properly protect your information?
This is where eSilo's data backup and cybersecurity services can help.
Any business can exponentially reduce their risk of a cyberattack or IT failure, and increase their chances of a full and speedy recovery with eSilo's data protection solutions.
Our team of professionals are expertly trained and ready to help you today. Give us a call or visit us online to learn more.
www.eSilo.com | 800-747-9255 | hello@esilo.com
Schedule a FREE Data Protection Audit at www.esilo.com/sales
-------------------------------------------------------------------------------------
𝗝𝗼𝗶𝗻 𝗼𝘂𝗿 𝗚𝗿𝗼𝘂𝗽𝘀 𝗳𝗼𝗿 𝗙𝗿𝗲𝗲 𝗧𝗲𝗰𝗵 & 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗶𝗽𝘀!
LinkedIn 🧑🤝🧑 https://www.linkedin.com/groups/8722123/
Facebook 🧑🤝🧑 https://fb.com/groups/techtipsforsmallbusiness
𝗙𝗼𝗹𝗹𝗼𝘄 𝘂𝘀 𝗼𝗻 𝗦𝗼𝗰𝗶𝗮𝗹
Facebook ➡️ https://www.facebook.com/eSiloDataBackup
LinkedIn ➡️ https://www.linkedin.com/company/esilo/
Twitter ➡️ https://twitter.com/eSiloDataBackup -
Ransomware Hidden as a Copyright Infringement Notice
In this video, Cathy Miron, CEO of eSilo, and Randi Karpinia, CEO of Sagacity Legal discuss a new and alarming type of cyberattack that delivers ransomware hidden inside a copyright infringement notice.
The attack has affected both businesses and individuals. Anyone with a web or social media presence, or who is guilty of using or sharing “free” photos or content they downloaded on the web is at risk of falling victim.
In this video, Cathy and Randi explain how this new infection tactic works, why it's so dangerous, and how to tell if a copyright infringement notice is real vs. fake, so you never accidentally fall for ransomware hidden inside a bogus “legal notice”.
But First, What is LockBit 2.0 Ransomware?
It's popular ransomware as a service (RaaS) strain that many hackers are using to target existing businesses. What’s most concerning about RaaS is that your attacker does not need to be highly skilled. Almost any cybercriminal can buy the ransomware “kit” and follow the instructions to deploy it.
Once installed, the ransomware encrypts files on the victim's computers and then demands payment in the form of cryptocurrency (usually Bitcoin) to unlock the files. LockBit 2.0 was first identified in June 2021 and it’s since been used to attack a number of small to large businesses across the globe.
How Does LockBit 2.0 Disguise Itself?
LockBit 2.0 disguises itself as a legal notice or official legal document. The claim will either look like it comes from a lawyer or attorney’s office, or it could appear to be sent by the claimants themselves.
The most common type of legal notice is a copyright infringement notice, claiming that the recipient has violated the copyright owner’s rights under the Digital Millenium Copyright Act (DMCA). The email goes on to include examples of the infringing material, along with proof of the sender’s copyright ownership. That "proof" is a PDF inside of an encrypted ZIP file attachment. But when you open it, you're installing malware. This is how ransomware can be hidden inside a copyright infringement notice, disguised as a simple PDF document.
Why is LockBit 2.0 Dangerous?
LockBit 2.0 is surging among small businesses, causing extensive disruptions made worse by loss of revenue and expensive ransom payments. The rise in recent cases also highlights a general lack of cybersecurity preparedness on the part of many small businesses, especially those without offsite backup plans.
By delivering ransomware hidden inside copyright infringement notices, cyber criminals are using human nature to their advantage. As a general rule, most people are afraid to get in trouble, tend to trust authorities and “official” looking correspondence, and are not very familiar with legal processes. This results in a social engineering campaign that is very effective and very difficult to distinguish from the real thing.
How Can You Avoid This Ransomware?
Watch this video for an in-depth discussion of what to look for so you know if a legal notice is real vs. fake. As a bonus, we also discuss Randi’s “Three Lines of Defense” model, which can ensure you stay compliant with all copyright laws, and never risk a violation in the first place. If you receive correspondence that you believe is a real legal notice, or even if you’re not sure, the best thing to do is to review it with your attorney or reach out to Randi or Cathy.
To learn additional ways to protect your business from legal “what if’s” be sure to SUBSCRIBE to Randi's YouTube channel below, or connect with her on LinkedIn.
Randi Karpinia, CEO of Sagacity Legal
YouTube: https://www.youtube.com/c/AttorneyRandiKarpinia
LinkedIn: https://www.linkedin.com/in/randikarpinia/
Website: www.sagacitylegal.com
Cathy Miron, CEO of eSilo
YouTube: www.esilo.com/youtube
LinkedIn: https://www.linkedin.com/in/cathytmiron
Website: www.esilo.com
--------------------------------
Most successful business owners are not IT pros. They use technology tools every day, but rely on someone else to manage their computers.
You know good cybersecurity and data protection are important, but do you have the right resources and expertise to properly protect your information?
This is where eSilo's data backup and cybersecurity services can help.
Any business can exponentially reduce their risk of a cyberattack or IT failure, and increase their chances of a full and speedy recovery with eSilo's data protection solutions.
Our team of professionals are expertly trained and ready to help you today. Give us a call or visit us online to learn more.
www.eSilo.com | 800-747-9255 | hello@esilo.com
Or schedule a FREE Data Protection Audit at www.esilo.com/sales -
Don't Lose $30,000 On This Fake Microsoft Tech Support Scam
In this video, Cathy retells a true story of a fake Microsoft tech support scam that almost cost her client $30K, and how to avoid Microsoft tech support scams in general.
There is a multitude of scams out there. They target us on our phones, at our computers, in our emails, and more. They can be so convincing that we often don’t even realize they’re happening until it's too late, but there are things each of us can do to avoid falling victim to scams.
Cybercriminals and scammers often use a combination of different methods to trick you, including:
* Phishing emails
* Fake websites
* Malicious advertisements ("malvertisements"), and more
Additionally, fake Microsoft tech support scams are one of the most common types of online fraud. They can be difficult to spot unless you're pretty tech savvy and are familiar with the most common types of error messages for your operating system. Tech support scammers know that when a scary warning message flashes on screen, people will panic and follow the message's instructions. When they call the phone number or visit the website listed on the message, they don't realize they're contacting the scammer, who then takes the con a step further.
In a fake tech support scam, the cybercriminal is usually impersonating a customer support representative from a well-known technology company. In this case, it was a fake Microsoft scam, but in others the employee claims to be from Apple, Best Buy's Geek Squad, or even your company's own IT department.
Posing as a fake Microsoft tech support employee, the scammer will ask you to provide login information or other sensitive data in order to fix some problem on your computer.
The catch is, that the very problem they're going to help you "fix" is actually a problem they created and launched against you!
In the video, Cathy explains how a client named Mike fell victim to a fake Microsoft tech support scam.
In Mike's case, he received a fake Microsoft pop-up that was designed to look like a legitimate Windows notification. It said that his computer was infected with a virus, and directed him to call Microsoft tech support immediately. He contacted the toll-free number on screen and was greeted by someone from Microsoft tech support, or so he thought.
Scams in general (and fake tech support scams in particular) are designed to take advantage of human emotions. By creating situations of urgency, fear, and confusion, victims become easier to manipulate. Especially when hackers impersonate a friendly tech support employee or trusted system administrator, it's easy to go along with the person on the other end of the phone or email.
Mike, in this situation, put his trust in the fake Microsoft tech support despite his better judgment because he was overwhelmed and emotionally distraught. He felt compelled into action. This set off a chain of events that almost led to him losing $30K to fake tech support scammers without realizing he was being taken!
Luckily, before Mike sent the money, he contacted eSilo to make sure it wasn't a mistake. We talked Mike through what happened, identified that it was a fake Microsoft tech support scam, stopped the money transfer, and undid the damage to his computer.
Mike's ordeal was a true nightmare, but with eSilo's technology, he was able to restore his systems quickly and completely.
Watch the rest of this video to find out exactly how the scammers convinced Mike to wire the money, how eSilo helped Mike overcome this fake Microsoft tech support scam, and what he is doing now to be better prepared to defend against future cyberattacks.
If you'd like to have a confidential conversation with Cathy to find out if you have the right protections in place, or to discuss your unique situation, schedule a call here: http://meetcathy.com
--------------------------------
Most successful business owners are not IT pros. They use technology tools every day, but rely on someone else to manage their computers.
You know good cybersecurity and data protection are important, but do you have the right resources and expertise to properly protect your information?
This is where eSilo's data backup and cybersecurity services can help.
Any business can exponentially reduce their risk of a cyberattack or IT failure, and increase their chances of a full and speedy recovery with eSilo's data protection solutions.
Our team of professionals are expertly trained and ready to help you today. Give us a call or visit us online to learn more.
www.eSilo.com | 800-747-9255 | hello@esilo.com
Schedule a FREE Data Protection Audit at www.esilo.com/sales
-------------------------------------------------------------------------------------
𝗙𝗼𝗹𝗹𝗼𝘄 𝘂𝘀 𝗼𝗻 𝗦𝗼𝗰𝗶𝗮𝗹
Facebook ➡️ https://www.facebook.com/eSiloDataBackup
LinkedIn ➡️ https://www.linkedin.com/company/esilo/
Twitter ➡️ https://twitter.com/eSiloDataBackup -
Don't Restore a System Backup Until You've Done This First
In this video, Cathy Miron shares the steps you must take before restoring a system backup or before restoring from a backup.
Before restoring from a backup, you should take a few precautionary measures. If you were to restore your data prematurely without following the cautionary steps listed below, you risk damaging your data backups.
𝐒𝐭𝐞𝐩𝐬 𝐭𝐨 𝐓𝐚𝐤𝐞 𝐁𝐞𝐟𝐨𝐫𝐞 𝐑𝐞𝐬𝐭𝐨𝐫𝐢𝐧𝐠 𝐟𝐫𝐨𝐦 𝐚 𝐁𝐚𝐜𝐤𝐮𝐩
𝟭.) 𝗦𝘁𝗼𝗽 𝘁𝗵𝗲 𝗗𝗮𝗺𝗮𝗴𝗲
Whatever is destroying or deleting your data in the first place, it’s critical to stop the damage before restoring a system backup.
𝟮.) 𝗣𝗿𝗲𝗽𝗮𝗿𝗲 𝗕𝗮𝗰𝗸𝘂𝗽𝘀
Often malware and ransomware can linger on a machine for days or weeks. Hence, in-depth analysis is required to determine which version of your backup is clean
𝟯.) 𝗗𝗶𝘀𝗰𝗼𝘃𝗲𝗿 𝘁𝗵𝗲 𝗡𝗲𝘅𝘁 𝗦𝘁𝗲𝗽𝘀 𝘁𝗼 𝘁𝗮𝗸𝗲 𝗕𝗲𝗳𝗼𝗿𝗲 𝗥𝗲𝘀𝘁𝗼𝗿𝗶𝗻𝗴 𝗮 𝗦𝘆𝘀𝘁𝗲𝗺 𝗕𝗮𝗰𝗸𝘂𝗽 𝗯𝘆 𝗪𝗮𝘁𝗰𝗵𝗶𝗻𝗴 𝘁𝗵𝗲 𝗥𝗲𝘀𝘁 𝗼𝗳 𝘁𝗵𝗲 𝗩𝗶𝗱𝗲𝗼!
The effects of cyberattacks can last for long periods of time. Often, it is tempting to restore immediately because you want to get up and running as soon as possible. In the long run, however, you'll save yourself headaches and hassle by following the steps listed in the video before restoring a system backup.
#cyberattacks #restorebackup #backupsolution
If you'd like to have a confidential conversation about your unique situation, I'm always accessible over here: http://meetcathy.com
--------------------------------
Most successful business owners are not IT pros. They use technology tools every day, but rely on someone else to manage their computers.
You know good cybersecurity and data protection are important, but do you have the right resources and expertise to properly protect your information?
This is where eSilo's data backup and cybersecurity services can help.
Any business can exponentially reduce their risk of a cyberattack or IT failure, and increase their chances of a full and speedy recovery with eSilo's data protection solutions.
Our team of professionals are expertly trained and ready to help you today. Give us a call or visit us online to learn more.
www.eSilo.com | 800-747-9255 | hello@esilo.com
Schedule a FREE Data Protection Audit at www.esilo.com/sales
-------------------------------------------------------------------------------------
𝗝𝗼𝗶𝗻 𝗼𝘂𝗿 𝗚𝗿𝗼𝘂𝗽𝘀 𝗳𝗼𝗿 𝗙𝗿𝗲𝗲 𝗧𝗲𝗰𝗵 & 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗶𝗽𝘀!
LinkedIn 🧑🤝🧑 https://www.linkedin.com/groups/8722123/
Facebook 🧑🤝🧑 https://fb.com/groups/techtipsforsmallbusiness
𝗙𝗼𝗹𝗹𝗼𝘄 𝘂𝘀 𝗼𝗻 𝗦𝗼𝗰𝗶𝗮𝗹
Facebook ➡️ https://www.facebook.com/eSiloDataBackup
LinkedIn ➡️ https://www.linkedin.com/company/esilo/
Twitter ➡️ https://twitter.com/eSiloDataBackup -
The True Cost of Business Downtime
In this video, Cathy Miron provides an in-depth explanation of the costs downtime has on your business.
Business owners know how devastating unplanned downtime can be to your business. Each minute that passes you can't help but think about how much money, time, and other resources are going down the drain. It is also likely to negatively affect your brand's reputation and decrease customer loyalty. Needless to say, the costs of downtime can severely impact your business.
𝐓𝐨𝐩 𝟑 𝐓𝐫𝐮𝐞 𝐂𝐨𝐬𝐭𝐬 𝐨𝐟 𝐃𝐨𝐰𝐧𝐭𝐢𝐦𝐞:
𝟭.) 𝗟𝗼𝘀𝗶𝗻𝗴 𝗗𝗮𝘁𝗮
Whether it is your own data, employee information, and/or customer data, losing that information can cost you $210 per record of personally identifiable information (PII). To put that into perspective, most businesses have collected hundreds or thousands of PII. So, If you lost 100 pieces of customer data, you would incur an extra $21,000 in costs.
On top of that, your business is subject to laws and regulations as a result of a record breach that could result in lawsuits from customers or employees.
𝟮.) 𝗟𝗼𝘀𝘁 𝗥𝗲𝘃𝗲𝗻𝘂𝗲
Downtime has a much larger impact than you’d expect because 1 week of downtime equates to about 2% of your annual revenue. Partially this is due to costs to recover, and another part is because you’re unable to sell, market, serve clients, or collect money during downtime. For a million-dollar business, one week of downtime would result in $20,000 of lost revenue.
𝟯.) 𝗟𝗼𝘀𝘁 𝗣𝗿𝗼𝗱𝘂𝗰𝘁𝗶𝘃𝗶𝘁𝘆
This is the time you’re spending on the phone calming angry customers, writing emails, consulting with your attorney, and more. It’s time that is not spent on business endeavors, but instead on recovering from a data breach. During this time, all hands will need to be on deck, and you may need to pay employees overtime. With those extra costs added to the $21,000 and $20,000 from the previous points, it will be very difficult for your business to recover from downtime without spending as much money as necessary.
Downtime is a serious consequence of cyber incidents that damages your business in the short and long run. To reduce this risk, use backup solutions to recover faster or implement antivirus software to prevent possible cyberattacks. Taking preventative measures could protect your business from unnecessary downtime and its costly consequences.
Do you have any questions, tips, or ideas about the true cost of business downtime? Let us know in the comments section below!
#systembackup #contingencyplans #downtime #cybersecurity
If you'd like to have a confidential conversation about your unique situation, I'm always accessible at http://meetcathy.com
--------------------------------
Most successful business owners are not IT pros. They use technology tools every day, but rely on someone else to manage their computers.
You know good cybersecurity and data protection are important, but do you have the right resources and expertise to properly protect your information?
This is where eSilo's data backup and cybersecurity services can help.
Any business can exponentially reduce their risk of a cyberattack or IT failure, and increase their chances of a full and speedy recovery with eSilo's data protection solutions.
Our team of professionals are expertly trained and ready to help you today. Give us a call or visit us online to learn more.
www.eSilo.com | 800-747-9255 | hello@esilo.com
Schedule a FREE Data Protection Audit at www.esilo.com/sales
-------------------------------------------------------------------------------------
𝗝𝗼𝗶𝗻 𝗼𝘂𝗿 𝗚𝗿𝗼𝘂𝗽𝘀 𝗳𝗼𝗿 𝗙𝗿𝗲𝗲 𝗧𝗲𝗰𝗵 & 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗶𝗽𝘀!
LinkedIn 🧑🤝🧑 https://www.linkedin.com/groups/8722123/
Facebook 🧑🤝🧑 https://fb.com/groups/techtipsforsmallbusiness
𝗙𝗼𝗹𝗹𝗼𝘄 𝘂𝘀 𝗼𝗻 𝗦𝗼𝗰𝗶𝗮𝗹
Facebook ➡️ https://www.facebook.com/eSiloDataBackup
LinkedIn ➡️ https://www.linkedin.com/company/esilo/
Twitter ➡️ https://twitter.com/eSiloDataBackup -
4 Common Cybersecurity Myths That Are Undermining Your Security
In life and in business, we are constantly bombarded by well-meaning advice from so-called experts. But buyer beware - not everyone has the real-life experience to back up their claims of "expert" status, and some of the advice you're being given is to serve someone else's agenda.
On a daily basis, I meet with business leaders to discuss their cybersecurity practices. And over the years, I have identified 4 common myths, or mistaken beliefs, that have been frequently cited by seasoned business owners as the reason why they believe they have their cybersecurity risks covered.
Watch this training to discover the 4 myths that are silently undermining your security, and what you can do about them.
Common Cybersecurity Myth #1: 𝗬𝗼𝘂 𝗱𝗼𝗻'𝘁 𝗻𝗲𝗲𝗱 𝗮𝗻𝘆𝘁𝗵𝗶𝗻𝗴 𝗺𝗼𝗿𝗲 𝘁𝗵𝗮𝗻 𝗮𝗻𝘁𝗶𝘃𝗶𝗿𝘂𝘀 𝗼𝗻 𝘆𝗼𝘂𝗿 𝗣𝗖
Marketing gimmicks can sometimes overpromise and underdeliver. Antivirus ads from big-name companies can do the same, often saying it’s an “all-in-one protection”, but the truth is they’re dangerously underdelivering. Don’t believe the marketers, because it’s cybersecurity is more complicated than they let on. And more often than not these big-name antivirus companies have their own issues, controversies, and vulnerabilities within the software they’re saying is “complete protection”.
Common Cybersecurity Myth #2: 𝗜'𝗺 𝘁𝗼𝗼 𝘀𝗺𝗮𝗹𝗹 𝘁𝗼 𝗯𝗲 𝘁𝗮𝗿𝗴𝗲𝘁𝗲𝗱 𝗳𝗼𝗿 𝗮𝗻 𝗮𝘁𝘁𝗮𝗰𝗸
There is no such thing as "too small". Cybercrime is a crime of opportunity and if you're unprotected, it's only a matter of time before you find yourself the victim of a breach. No matter how small you are, or how much or how little data you have, ransomware can take your business offline in a heartbeat. Because small businesses are poorly defended and very dependent on their systems to operate, it's highly likely that a small business will pay a ransom to get its data back.
Common Cybersecurity Myth #3: 𝗔 𝘀𝘁𝗿𝗼𝗻𝗴, 𝗰𝗼𝗺𝗽𝗹𝗲𝘅 𝗽𝗮𝘀𝘀𝘄𝗼𝗿𝗱 𝗶𝘀 𝗮𝗹𝗹 𝘆𝗼𝘂 𝗻𝗲𝗲𝗱
Hackers only need to be lucky once, you need to be lucky every time. We've all been told to create long, complex and unique passwords, but this approach also leads to poor password practices that put your accounts at greater risk. Watch the video to see what else you can be doing to pair your strong passwords with even better security controls.
Common Cybersecurity Myth #4: 𝗗𝗮𝘁𝗮 𝗶𝗻 𝘁𝗵𝗲 𝗰𝗹𝗼𝘂𝗱 𝗶𝘀 𝘀𝗮𝗳𝗲 𝗮𝗻𝗱 𝗮𝗹𝗿𝗲𝗮𝗱𝘆 𝗯𝗮𝗰𝗸𝗲𝗱 𝘂𝗽
The cloud is not magic and it's not immune to hackers and data loss. The "cloud" is simply equipment in someone else's data center. It's still managed and overseen by humans, which makes it imperfect. Those data centers can still experience hardware failure, natural disasters, and other forms of data loss.
Cybersecurity is a complex topic. While there are many up-and-coming "experts", blogs, and online resources you can turn to, it still pays to do your own due diligence and scrutinize who you take your advice from. Your nephew or the computer-savvy kid down the street might not be the best places to go for advice on matters that could have an outsized impact on the health of your business.
If you'd like to have a confidential conversation about your unique situation, I'm always accessible here: http://meetcathy.com.
#commoncybersecuritymyths #cybersecuritymyths #cybersecurity #mfa #cloudbackup #cloudsync #databackup
--------------------------------
Most successful business owners are not IT pros. They use technology tools every day, but rely on someone else to manage their computers.
You know good cybersecurity and data protection are important, but do you have the right resources and expertise to properly protect your information?
This is where eSilo's data backup and cybersecurity services can help.
Any business can exponentially reduce their risk of a cyberattack or IT failure, and increase their chances of a full and speedy recovery with eSilo's data protection solutions.
Our team of professionals are expertly trained and ready to help you today. Give us a call or visit us online to learn more.
www.eSilo.com | 800-747-9255 | hello@esilo.com
Schedule a FREE Data Protection Audit at www.esilo.com/sales
-------------------------------------------------------------------------------------
𝗝𝗼𝗶𝗻 𝗼𝘂𝗿 𝗚𝗿𝗼𝘂𝗽𝘀 𝗳𝗼𝗿 𝗙𝗿𝗲𝗲 𝗧𝗲𝗰𝗵 & 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗶𝗽𝘀!
LinkedIn 🧑🤝🧑 https://www.linkedin.com/groups/8722123/
Facebook 🧑🤝🧑 https://fb.com/groups/techtipsforsmallbusiness
𝗙𝗼𝗹𝗹𝗼𝘄 𝘂𝘀 𝗼𝗻 𝗦𝗼𝗰𝗶𝗮𝗹
Facebook ➡️ https://www.facebook.com/eSiloDataBackup
LinkedIn ➡️ https://www.linkedin.com/company/esilo/
Twitter ➡️ https://twitter.com/eSiloDataBackup -
How to Secure Your Accounts and Passwords - 3 Simple Steps
80% of all cybersecurity breaches involve a weak or stolen password, according to Newsweek. Do you know how to secure your accounts and passwords?
May 5th is World Password Day and, we’re sharing 3 incredibly easy tips to help you secure your accounts and passwords.
Watch this short 1-minute video to learn:
👉 Why you should never reuse passwords across multiple sites
👉 Don’t use these common things when creating a password, and what to use instead
👉 How to store and manage your passwords securely, without memorizing them all!
Almost every business leader, entrepreneur and individual I've ever met has had at least one password lost or stolen in the past. Oftentimes, through no direct fault of their own. A website or a service you use gets hacked, and your name, email, password and more get leaked on the dark web for the world to see.
We all know we're supposed to use long, complex and unique passwords to protect our accounts, but let's be real for a moment. Doing what we know we're supposed to do is time-consuming and tedious. And some sites just aren't worth the hassle, right?
It can be challenging to secure your accounts and passwords, but the 3 simple tips included in this video will make it painless.
And what's the alternative?
It's certainly better than rushing to change all your passwords in a frenzy when one gets leaked, or to deal with the headaches of identity theft, payment fraud, or account hijacking.
If you need help to secure your accounts and passwords, I invite you to reach out and chat.
You can always find me here at http://meetcathy.com
_______________________________________________
𝗖𝗼𝗻𝘁𝗮𝗰𝘁 𝗨𝘀
🌐 https://www.esilo.com/contact-us/
📞 (800) 747-9255
📧 hello@esilo.com
𝗝𝗼𝗶𝗻 𝗼𝘂𝗿 𝗢𝗻𝗹𝗶𝗻𝗲 𝗚𝗿𝗼𝘂𝗽𝘀 (Get free data security & tech tips!)
LinkedIn 🧑🤝🧑 https://www.linkedin.com/groups/8722123/
Facebook 🧑🤝🧑 https://www.fb.com/groups/techtipsforsmallbusiness/
𝗙𝗼𝗹𝗹𝗼𝘄 𝘂𝘀 𝗼𝗻 𝗦𝗼𝗰𝗶𝗮𝗹
Facebook ➡️ https://www.facebook.com/eSiloDataBackup
LinkedIn ➡️ https://www.linkedin.com/company/esilo/
Twitter ➡️ https://twitter.com/eSiloDataBackup -
An Overview of an Holistic Security Assessment
Today’s video is all about what you can expect in a holistic cybersecurity assessment. Most business owners are concerned about their risk of falling victim to a cyberattack. A cybersecurity assessment is a great way to get an understanding of where your cybersecurity strengths and weaknesses are so that you can fill any gaps and improve the education and processes in your organization.
So, when you think about a cybersecurity assessment, the first thing to understand is the scope. Now, the way we look at these is we start with the endpoint, whether that’s a computer, mobile device, tablet, etc. So, let’s say everything is running off of the server in your office. All of these devices are connected to that server to get the data. We want to ensure that each one of these devices is in and of itself secure, so that might be requiring anti-malware software on those devices or ensuring that their configurations and settings and firewalls are all set to avoid unauthorized connections or contacts.
Then we want to look at the other places where you store your data. But we want to understand all of the different places you are sending and receiving data and how you are protecting those repositories? And that includes how you use strong authentication, and how you’re managing your user accounts and turning them off when they’re no longer needed. That may include admin settings, so who can share what, what gets backed up, etc.
So we want to look at all of the different things when considering these locations for data and these devices that access them. And then the last thing that we can never forget is the people. So, when you think about people, processes, and tools when it comes to people, we need to know that everybody we give a key to our data that they are adequately protecting that key and know what to do with it. How they are protecting their accounts with strong passwords, how they are storing those in a password manager, and using a token device for multifactor authentication, and how they are protecting the devices in their possession. As well as their level of training in cybersecurity and good IT practices in general.
And so, through a combination of these things, we can easily take a look at your business and make some recommendations for practices that you might want to strengthen or gaps that you want to plug into the overall environment.
If you'd like to have a confidential conversation about your unique situation, I'm always accessible over here: http://meetcathy.com
--------------------------------
Most successful business owners are not IT pros. They use technology tools every day, but rely on someone else to manage their computers.
You know good cybersecurity and data protection are important, but do you have the right resources and expertise to properly protect your information?
This is where eSilo's data backup and cybersecurity services can help.
Any business can exponentially reduce their risk of a cyberattack or IT failure, and increase their chances of a full and speedy recovery with eSilo's data protection solutions.
Our team of professionals are expertly trained and ready to help you today. Give us a call or visit us online to learn more.
www.eSilo.com | 800-747-9255 | hello@esilo.com
Schedule a FREE Data Protection Audit at www.esilo.com/sales
-------------------------------------------------------------------------------------
𝗝𝗼𝗶𝗻 𝗼𝘂𝗿 𝗚𝗿𝗼𝘂𝗽𝘀 𝗳𝗼𝗿 𝗙𝗿𝗲𝗲 𝗧𝗲𝗰𝗵 & 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗶𝗽𝘀!
LinkedIn 🧑🤝🧑 https://www.linkedin.com/groups/8722123/
Facebook 🧑🤝🧑 https://fb.com/groups/techtipsforsmallbusiness
𝗙𝗼𝗹𝗹𝗼𝘄 𝘂𝘀 𝗼𝗻 𝗦𝗼𝗰𝗶𝗮𝗹
Facebook ➡️ https://www.facebook.com/eSiloDataBackup
LinkedIn ➡️ https://www.linkedin.com/company/esilo/
Twitter ➡️ https://twitter.com/eSiloDataBackup -
How to Stop Facebook from Spying on Your Web Activity
Have you ever experienced a scenario where you are looking for a product on a separate website? Then later you scroll through Facebook and find an advertisement that’s pushing the exact same product. It’s as if Facebook is spying on you or listening. If this has happened to you, you may be wondering what you can do to stop it?
Today’s tech tip is all about Facebook privacy settings that will help you take control over what information Facebook collects about you and your browsing history.
To do this, you’ll go to “Settings & Privacy” on your Facebook page, then “Your Facebook Information” and you’ll see there’s a setting for “off-Facebook activity”. This is how Facebook spies on you. It’s the information that websites can send to Facebook about what you’re doing on their sites.
Now, click “Recent Activity”. This page will show you the recent activity of websites that have sent data to Facebook to spy on you. The list of websites may be of recent visits or from months back. So, what you can do is choose any one of the websites and click the “Disconnect” button. Alternatively, is to go to the “off-Facebook activity” page and select “Disconnect future activity”. Then toggle the button to the right to “off” and press confirm. The full disconnect can take up to 48 hours to fully process.
And if you’re using your Facebook account to log into any of the websites you disconnected, simply create a new account using a custom username and password so you’re not using your Facebook credentials. Do not use your Facebook or Google credentials to log into those websites or it’ll create a connection to Facebook again. It’s tempting because it’s easier, but it can also create an issue where if your account is compromised and somebody gets access to that username and password now they can get themselves into all the other sites.
Implementing the advice above can stop Facebook from spying on web activity.
If you'd like to have a confidential conversation about your unique situation, I'm always accessible over here: http://meetcathy.com
--------------------------------
Most successful business owners are not IT pros. They use technology tools every day, but rely on someone else to manage their computers.
You know good cybersecurity and data protection are important, but do you have the right resources and expertise to properly protect your information?
This is where eSilo's data backup and cybersecurity services can help.
Any business can exponentially reduce their risk of a cyberattack or IT failure, and increase their chances of a full and speedy recovery with eSilo's data protection solutions.
Our team of professionals are expertly trained and ready to help you today. Give us a call or visit us online to learn more.
www.eSilo.com | 800-747-9255 | hello@esilo.com
Schedule a FREE Data Protection Audit at www.esilo.com/sales
-------------------------------------------------------------------------------------
𝗝𝗼𝗶𝗻 𝗼𝘂𝗿 𝗚𝗿𝗼𝘂𝗽𝘀 𝗳𝗼𝗿 𝗙𝗿𝗲𝗲 𝗧𝗲𝗰𝗵 & 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗶𝗽𝘀!
LinkedIn 🧑🤝🧑 https://www.linkedin.com/groups/8722123/
Facebook 🧑🤝🧑 https://fb.com/groups/techtipsforsmallbusiness
𝗙𝗼𝗹𝗹𝗼𝘄 𝘂𝘀 𝗼𝗻 𝗦𝗼𝗰𝗶𝗮𝗹
Facebook ➡️ https://www.facebook.com/eSiloDataBackup
LinkedIn ➡️ https://www.linkedin.com/company/esilo/
Twitter ➡️ https://twitter.com/eSiloDataBackup -
Cloud Sync vs. Cloud Backup (And Why The Difference Matters)
Understanding how to properly back up your data is crucial to protecting your data. But, there are so many types of backups and software that operate as one, it is easy to miss the target and become vulnerable to a cyberattack.
In this video, we’ll cover the key differences between Cloud Sync vs. Cloud Backup and why the difference matters.
When it comes to protecting your data, cloud sync does not provide the same level of security as a business-grade cloud backup.
Cloud sync service is great for keeping a copy of your data on another device. It may protect your data if your device is damaged, but cloud sync will not give you complete guaranteed protection. Cloud sync is not able to protect the databases, applications, and overall system your data may reside on. It’s only able to protect files and documents. To protect the entirety of your operating system, you’ll need a full image backup solution.
Secondly, cloud sync takes longer to restore files and documents because it has to be done one by one. Consequently, you'll browse through the version history, select it, and restore it. It can be tedious and time-consuming to go through each file in your cloud sync tool. Especially in moments you may have faced a cyberattack and need to restore hundreds of important documents one by one. A business-grade cloud backup tool is much faster at restoring multiple documents, systems, and more at once.
Thirdly, version control is much different with a cloud sync tool. A document's version history may differ depending on which cloud sync service is used. But, a cloud backup service will have a clear retention policy.
Fourthly, cloud sync services have a high rate of change. So, every time you make a change to a file then those changes are synced to the cloud and any other accounts connected to the cloud. It's great in theory, but it can be tedious if you make a mistake when editing a file and have to comb through the version history to find the right version. Cloud backup tools have fixed version history, making it much easier and less time-consuming to find the version of the file you need.
Overall, knowing the difference between cloud sync and cloud backup will help you make an informed decision about what is best for you individually or for your business.
#databackup #dataprotection #cybersecurity #cloudbackup #ITmistakes #techtipsforbusiness #techtips
If you'd like to have a confidential conversation about your unique situation, I'm always accessible over here: http://meetcathy.com
--------------------------------
Most successful business owners are not IT pros. They use technology tools every day, but rely on someone else to manage their computers.
You know good cybersecurity and data protection are important, but do you have the right resources and expertise to properly protect your information?
This is where eSilo's data backup and cybersecurity services can help.
Any business can exponentially reduce their risk of a cyberattack or IT failure, and increase their chances of a full and speedy recovery with eSilo's data protection solutions.
Our team of professionals are expertly trained and ready to help you today. Give us a call or visit us online to learn more.
www.eSilo.com | 800-747-9255 | hello@esilo.com
Schedule a FREE Data Protection Audit at www.esilo.com/sales
-------------------------------------------------------------------------------------
𝗝𝗼𝗶𝗻 𝗼𝘂𝗿 𝗚𝗿𝗼𝘂𝗽𝘀 𝗳𝗼𝗿 𝗙𝗿𝗲𝗲 𝗧𝗲𝗰𝗵 & 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗶𝗽𝘀!
LinkedIn 🧑🤝🧑 https://www.linkedin.com/groups/8722123/
Facebook 🧑🤝🧑 https://fb.com/groups/techtipsforsmallbusiness
𝗙𝗼𝗹𝗹𝗼𝘄 𝘂𝘀 𝗼𝗻 𝗦𝗼𝗰𝗶𝗮𝗹
Facebook ➡️ https://www.facebook.com/eSiloDataBackup
LinkedIn ➡️ https://www.linkedin.com/company/esilo/
Twitter ➡️ https://twitter.com/eSiloDataBackup -
The Basics of Multifactor Authentication and Why You Should Use It
Today’s video is a crash course on the basics of Multifactor Authentication (MFA) and why you should want to use it. Multifactor Authentication, sometimes referred to as two-factor authentication (2FA), is the best thing that you can do to protect your online accounts.
Multifactor Authentication means there are multiple factors used to prove your identity to online accounts. MFA says, “I need something that you KNOW and something that you HAVE to prove that you really are you.”
The username and password are something that you know. A unique code that you (and only you) possess is something that you have. In some scenarios, there are additional factors that can be used by MFA, like a biometric fingerprint which is something that you are, or your IP address which is your location.
It's common to receive MFA codes sent through text messages, but it is a mistake to believe that this easiest and most secure way to use Multifactor Authentication. Text messages are inherently not secure because they are not encrypted and can be easily intercepted by a skilled hacker.
Your text messages can also be hijacked. This has been proven through hackers calling up mobile phone companies pretending to be you, and convincing customer service staff to change the SIM card associated with a particular account. By transferring your account to another physical device they control, they gain full access to all phone calls and text messages -- meaning that your MFA codes are sent via text directly to the hacker.
The better and safer method to receive those MFA codes is either through an Authenticator app like Google Authenticator or Microsoft Authenticator. When you set up your Multifactor Authentication, it’s important to save a set of backup codes, also. These are preset numbers that don't change and can be used to access your account in an emergency. What you should do is print them out or save them in your password manager. You never want to save them just on the hard drive of your computer.
The importance of saving a set of backup codes when you configure each of your online accounts for MFA cannot be understated. If you lose your phone or lock yourself out of your Authenticator app, you will need to contact every one of the account providers to verify your identity and reset your login security settings. Proof of identity can require you to upload a copy of your government-issued ID or to confirm the credit card associated with your account. So while it can be done, it’s a very tedious process and one you want to avoid if at all possible.
If you'd like to have a confidential conversation about your unique security needs or concerns, I'm always accessible over here: http://meetcathy.com
--------------------------------
Most successful business owners are not IT pros. They use technology tools every day, but rely on someone else to manage their computers.
You know good cybersecurity and data protection are important, but do you have the right resources and expertise to properly protect your information?
This is where eSilo's data backup and cybersecurity services can help.
Any business can exponentially reduce their risk of a cyberattack or IT failure, and increase their chances of a full and speedy recovery with eSilo's data protection solutions.
Our team of professionals are expertly trained and ready to help you today. Give us a call or visit us online to learn more.
www.eSilo.com | 800-747-9255 | hello@esilo.com
Schedule a FREE Data Protection Audit at www.esilo.com/sales
-------------------------------------------------------------------------------------
𝗝𝗼𝗶𝗻 𝗼𝘂𝗿 𝗚𝗿𝗼𝘂𝗽𝘀 𝗳𝗼𝗿 𝗙𝗿𝗲𝗲 𝗧𝗲𝗰𝗵 & 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗶𝗽𝘀!
LinkedIn 🧑🤝🧑 https://www.linkedin.com/groups/8722123/
Facebook 🧑🤝🧑 https://fb.com/groups/techtipsforsmallbusiness
𝗙𝗼𝗹𝗹𝗼𝘄 𝘂𝘀 𝗼𝗻 𝗦𝗼𝗰𝗶𝗮𝗹
Facebook ➡️ https://www.facebook.com/eSiloDataBackup
LinkedIn ➡️ https://www.linkedin.com/company/esilo/
Twitter ➡️ https://twitter.com/eSiloDataBackup
Video testJames Feudo2022-05-04T16:18:22+00:00