X

Welcome to the ENE Complete Security Ticker

Updates posted daily.  Subscribe for up-to-the-minute email updates...

Creating an I.T. Risk Assessment Program for SMBs

Creating an I.T. Risk Assessment Program for SMBs

It's only a matter of time before your company's data is breached. Will you be ready?

It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.

Small and medium-sized business (SMB) owners are often told that it is only a matter of time before their IT infrastructure will be compromised. To minimize the fallout from a data breach, SMB owners should develop and implement an IT risk assessment program. Business owners understand the need, but tight budgets and confusion over the best program to use can hinder the process.

This article will focus on the recommendations of IT consultants who provide IT risk assessment services, and it will outline the process of how SMBs can create one to protect their organizations.

Thursday, April 26, 2018/Author: Barry Thompson/Number of views (1)/Comments (0)/ Article rating: No rating
Email Scam of the Day

Email Scam of the Day

This article will be updated regularly with the latest circulating scams

Phishing and phony web pages are the modern day version of "the sting" con game and represent the most widespread internet and email scams today. "Phishing" is where digital thieves lure you into divulging your password info through convincing emails and web pages.

Monday, December 18, 2017/Author: Barry Thompson/Number of views (41)/Comments (0)/ Article rating: No rating
Tags:
Online Holiday Shopping Security Tips

Online Holiday Shopping Security Tips

How to avoid scams during your holiday shopping online

With the holidays approaching and online holiday shopping in full swing, I thought it might be a good time to remind everyone that you should be very careful about opening email messages with attachments claiming to be “Invoices” that are due.   Never open attachments or click links in emails that were sent to you, unsolicited, from people or companies you don’t know or have never heard of.   Here are a few tips to help keep you safe this season while you shop online:

Tuesday, November 28, 2017/Author: Barry Thompson/Number of views (38)/Comments (0)/ Article rating: No rating

Credit Freeze - How to Initiate

The do's and don't of setting up a credit freeze

Thursday, November 16, 2017/Author: Barry Thompson/Number of views (32)/Comments (0)/ Article rating: No rating
Internet Threat Guide - 2017 Edition

Internet Threat Guide - 2017 Edition

A little bit of information can prevent a potential catastrophe on your network

Malware is a blanket industry term used to describe the variety of "malicious software" that is in circulation around the world. The definition includes viruses, worms, Trojans, computer "bombs", and other forms of intentionally destructive software, as well as annoying but generally non-destructive software pranks. Laypeople, misinformed network administrators, and the mainstream press often describe various types of malware as "computer viruses", with little regard as to whether the code really is a virus. To them, the distinction between the various forms of destructive software means little, and the general term of "computer virus" is simple and easy to understand. However, to the network administrator and the computer industry in general, being able to accurately identify and classify the type of malicious software spreading across global networks is a crucial step in developing strategies to contain and eradicate it.

Tuesday, October 17, 2017/Author: Barry Thompson/Number of views (40)/Comments (0)/ Article rating: No rating
Tags:
FBI: Ransomware on the rise

FBI: Ransomware on the rise

This emerging threat is projected to cost American business Billions in 2017

 

The FBI is reporting that reported incidents of ransomware have increased sharply in the last 18 months and the acceleration shows no signs of slowing down.  This means it is very likely that the business sector will be the next target.

Friday, September 15, 2017/Author: Barry Thompson/Number of views (0)/Comments (0)/ Article rating: No rating
ENE To Offer Free Ransomware Seminar Series

ENE To Offer Free Ransomware Seminar Series

Seating will be limited

September 15, 2017

ENE Systems, Inc. will present an executive seminar on the emerging threat that ransomware poses to businesses. 

Friday, September 15, 2017/Author: Barry Thompson/Number of views (39)/Comments (0)/ Article rating: No rating
The Blind Request Click-Bait Scam

The Blind Request Click-Bait Scam

How hackers use subtle social engineering techniques to bait you into clicking something you shouldn't click

 

The Blind Request Click-Bait Scam has been around in various forms almost since the beginning of email way back in the America Online days when we all dialed up over copper phone lines and were lucky to get a 56kbps connection.  Here's how it works these days.

Thursday, September 14, 2017/Author: Barry Thompson/Number of views (41)/Comments (0)/ Article rating: No rating
RSS
12