Posts by Omar Zarabi

What is the NIST Cybersecurity Framework?

For as long as we can remember, smaller entities have been held accountable to the same security and compliance standards as enterprise sized organizations in their industry. From regional credit unions scrambling to comply with the same regulations as major banks like Wells Fargo and Bank of America to local “Main Street” merchants struggling with…

Read More

Don’t Let Hackers Ruin Your Summer Vacation

You may be taking a vacation, but hackers are not. In fact, many hackers wait for times like this when security teams are likely to be short staffed because of vacations or holidays. Learn how to protect yourself and your company from a cyber attack while traveling.

Read More

What to Look For in a Cybersecurity Solution

When buying cybersecurity protection, small businesses face many choices.  What kinds of solutions are really needed?  How do you pick the right option?  Should you pick a cloud-based solution or something on-premise?  Pick the wrong solution and you may be under-protected, spending way too much money, or hopelessly bogged down with too many alerts or…

Read More

How Do You Respond To A Cyber Attack?

The Impact of a Cyber Attack The impacts of a cyber attack can be devastating to an SMB or mid-size company.  When an attack happens, you may not have access to business-critical systems needed to run your company. According to Cisco’s 2018 Security Capabilities Benchmark study, 40% of SMBs experienced downtime of 8 hours or…

Read More

Is Shadow IT Putting Your Organization at Risk?

The traditional ways of approaching IT security are no longer enough. When most IT was handled on-premises a comprehensive security strategy would involve securing your hardware and network, put in place the appropriate firewalls, protect yourself with a good antivirus software, regularly update all company approved software, and backup your data regularly. But Cloud Computing…

Read More

Small Businesses Face a ‘Perfect Storm’ for Cybersecurity

What is a Perfect Storm? Wikipedia describes a Perfect Storm as an event in which a rare combination of circumstances drastically aggravates the event.   In other words, a worst-case scenario.  Today Cybersecurity presents small businesses with a Perfect Storm as they try to protect their IT environments. Hackers are increasingly focusing on SMBs (43% of cyber…

Read More

CYBERSECURITY STARTS WITH YOUR EMPLOYEES

Your employees may be the most critical part of your cybersecurity strategy.  Up to 25% of data breaches are caused by employee “mistakes” (2018 Cost of a Data Breach Study by Ponemon).   It happens in even the largest companies. Human error was blamed in the Equifax breach of over 147 million consumer’s sensitive credit data.…

Read More