How to Protect Your Company’s Reputation After a Data Breach

How to Protect Your Company’s Reputation After a Data Breach

In today’s world, a data breach is inevitable even with all of the advanced security strategies in place. While you shouldn’t stop trying to proactively protect your business, you need an incident response plan in place and ready to implement. Your reputation may take a hit at first, but there are things businesses can do […]

Has My Social Media Account Been Hacked or Cloned?

Has My Social Media Account Been Hacked or Cloned

Every day, we see posts on Facebook from friends saying they’ve been “hacked” and to not accept friend requests from them. While it’s still a form of social engineering, your account hasn’t technically been “hacked.” Instead, it’s been cloned.  Hacking is where a cyber criminal obtains your login credentials and accesses your account while social […]

How Much is Email Used?

https://youtu.be/dNmv9DWtc_U     For this Tuesday’s Tech Tip, I’m going to start a series that’s going to run for ten weeks. We’re going to talk about email security specifically. I’ve had a large number of people requesting, and asking how to secure their email. Because quite frankly, it is like the gateway drug, if you […]

6 Deadly Mistakes You’re Making with Your Remote Employees

6 Deadly Mistakes You're Making with Your Remote Employees

During the pandemic, 70% of full-time employees worked from home. Once it was over, 92% of workers still expected to work from home at least once per week while 80% expected to telecommute 3 days. In fact, 16% of organizations are now fully remote. While many employees may be back in the office, there’s always […]

5 Easy Ways to Secure Your Data

5 Easy Ways to Protect Your Data (1)

Many Americans are concerned about the Russia-Ukraine war for a number of reasons; and one of those reasons is cyber attacks. As the war rages on and continues to escalate, there has been a documented increase in breaches. This is a very real threat to businesses and individuals alike in the United States.  So, what […]

Why is Cyber Liability Insurance Important?

https://youtu.be/yYBE4G702eU Cyber liability insurance is going to be one of the biggest factors in helping industries of all types, practice better cybersecurity hygiene. In doing so, insurance companies are starting to enforce basic cybersecurity practices. When applying for cyber liability insurance for your business, you will have to answer several technical questions to make sure […]

New Advanced Email Security Solution Protects Against Phishing Attacks and Email Impersonation 

NEW ADVANCED EMAIL SECURITY SOLUTION PROTECTS AGAINST PHISHING ATTACKS AND EMAIL IMPERSONATION

Robertsdale, AL (April 8, 2022) – Business Information Solutions, Inc. (BIS), the leading technology and cybersecurity firm on the Gulf Coast, announces a new, advanced email security platform to combat phishing attacks and email impersonation.   In 2020, 75% of organizations experienced a phishing attack. These numbers continue to rise as hackers find creative ways to infiltrate […]

Microsoft 365 Security

https://youtu.be/ETeqPp0Sq7U For our Tuesday Tech Tip, I want to talk a little bit about Microsoft 365 and some of the enhanced security features that are out there. If you’re not aware, Microsoft 365 has a ton of different SKUs or different part numbers or different products is what they are. Some of them are kind […]

How to Secure Your Data When Using Subcontractors

For today’s tech tip, I want to talk about ways that you can share data and keep it under control whenever you’re using an outsourced third party. For example, a broker who has multiple number of real estate agents that work underneath him. Stay tuned.
Specifically, I want to talk about how you secure files in two different industries. It’s really going to have a much broader application, but if I say to these two industries I think you’ll get the point.
So first off, I met with a person that does private investigations. They outsource certain parts of the private investigation, such as the videoing. Let’s just say that this is for a company and they’re looking for fraud in workers compensation. So this person gets a job with a particular insurance company, and then they’re outsource the work to a third party investigator who goes out to film and maybe even kind of follow the person around to try to catch them doing something. You know, they say they have a bad back but are caught throwing a cast net or something. The second is in the real estate industry where a broker is using real estate agents in order to sell property. Both of these categories have very sensitive data that’s being exchanged. And what you don’t want to do is you don’t want them using their personal email accounts. You don’t want the subcontractor using their personal Dropbox accounts. You don’t want them passing this information on their equipment with no backup and no way to log where these files are.
It’s almost like you’re just taking these very sensitive files that are ultimately these business owners, this broker and the head of this investigation firm, they’re responsible for these files and they’re just letting them be cast wherever with no tracking or anything.
So what you do want to do and this is the part I really want you to hear me say. You can use something as easy as Microsoft 365 configured in the proper way. Set up a domain and allow the Microsoft 365 platform to put the security parameters around there for you. First of all, use a corporate email address for all of those transactions that has that Personal Identifiable Information or private information in it.
You need to have that filtered so that the links are being checked, the attachments are being checked, and the spam is being blocked, as well as the ability to send secure email. Because if you don’t give your people away to do that, they will never do it. Or if they do, they’ll do it in a very dangerous fashion. And then secondly, you want to make sure that is backed up so that if you got sideways with that employee, they couldn’t delete everything and you not know what’s going on. So you need that Office 365 tenancy backed up. You can also share documents and communication by using Microsoft Teams. So you’ve got a secure channel that will work on a computer. It’ll work on a mobile phone or a tablet. So you can securely share and track the files that are in play there. And really, when you look at how teams work, it is basically going into the person’s one drive that is ultimately on SharePoint so that you could have access to these files even via the web.
So there’s some really great ways that you can do this that will actually enhance the overall performance of the organization and keep you legal. If you got more questions, I’d be happy to help, but don’t let a challenge like this put your company at risk. Thank you for watching.

5 Ways to Prevent Your Cyber Liability Claim from Being Denied

5 Ways to Prevent Your Cyber Liability Claim from Being Denied

As a business owner you need to have the mindset that it’s no longer “if” you get hacked but “when.” As the number of data breaches continues to increase, companies are turning to cyber liability insurance for more protection. Unfortunately, due to the number of cyber attacks and claims, cyber insurance firms are limiting payouts […]