• 888 238 7732
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

Blog

Netcotech Blog

Pokemon Go Brings New IT Threats to Company Networks

Pokemon Go Brings New IT Threats to Company Networks
Pokemon Go Brings New IT Threats to Company Networks Gaming isn’t exactly a recommend office activity for most businesses, how people spend their private time is generally their business. But because of the new Pokemon Go craze there’s a huge new rash of potential security risks to watch out for in your office, and you better get up to speed fast. Pokemon Go has quickly become the most popular downloaded game in North American history. Just as quickly, it’s attracted organized cybercrime, and with it an unprecedented onslaught of new phishing hazards. It’s not just the range of new traps that is surprising, but also speed in which they are coming on stream. These are the same criminal networks that have almost tripled phishing attacks on corporate employees this year . They're using adaptations and variations of many of those same successful tactics and tools on Pokemon Go players. So far it's been a smorgasbord for them.   If your company or organization has employees who play Pokemon Go who connect to your network with private mobile devices or VPN, your data security may soon be at risk.   Some quick stats about Pokemon Go you should know Consider that...

Continue reading
  2513 Hits

Who Thinks These Weak Passwords Are Funny? The Joke is On Us.

Who Thinks These Weak Passwords Are Funny? The Joke is On Us.
Who Thinks These Weak Passwords are Funny? The Joke is on us.      We all know that password security is important—especially in an office. But our user's personal account passwords aren’t always top-of-mind when we think of office network and data security. It ought to be, because every user survey I’ve ever seen scares the crap out of me. It should scare you too. Security experts have been warning us for more than 20 years that the most common passwords people use online provide ZERO to NO barriers to intrusion by hackers. We collectively smirk and grin, and probably wonder at who these silly people are who think they’re securing their online accounts with such ridiculously simple passwords. “Stoopid people”, right? Well, the joke’s on us for everyone who manages an office with users who access an office network at work or from home. Let me explain, but first, you have to look closely here at SplashData ’s January 2016 Annual List of the 25 Most Common Hacked Passwords … Yes, it looks just like the same list of the most common passwords we saw three years ago, and three years before that. Why aren't people "getting it"? Rank   Password   Change from 2013 1...

Continue reading
  5572 Hits

25 Signs You May Need a Managed IT Services Partner

25 Signs You May Need a Managed IT Services Partner
25 Signs You May Need a Managed IT Services Partner …even if you already have an in-house IT department   IT management is not always on the “top-of-mind” for most executive teams. That’s probably best for most companies—it could mean everything is running as smooth as a well-oiled machine and there are no issues or emergencies screaming for your attention. Increasingly for many companies today, the reality is often different. In the last six months I’ve heard the words “chaotic”, “lacking”, “falling behind” and “embarrassingly outdated” to describe existing network infrastructures from new clients. These companies’ data systems were clearly at risk. Obviously, the best time to review your IT needs is long before you hear these words. But how do you know you’re a good candidate for Managed IT Services? We thought it would be helpful to give you some helpful clues here that you may need a managed IT services partner. Or maybe a better IT services partner. If you’ve ever heard any of these following comments in your organization, it’s time for a review. Here they are: our top 25 clues you may need a managed services partner Listen for any of these or similar comments… The...
Continue reading
  1807 Hits

Cyber Attack Stats Reveal What Typical Target Companies Look Like

Cyber Attack Stats Reveal What Typical Target Companies Look Like
Cyber Attack Stats Reveal What Typical Target Companies Look Like Surprise—it’s not the big companies we usually read about… We’ve all seen the headlines about a national retailer or government organization getting hacked into, where either millions of client credit cards were stolen or huge databases of personal information were accessed and downloaded. These are the headline grabbers, and they happen almost weekly today. Where it does happen, it often causes unimaginable grief, money and/or inconvenience for clients and customers; and panic, great expense and reputation loss for the target companies.      This week we show you some surprising facts uncovered by Ponemen Institute in a benchmark study sponsored by IBM . What’s notable is that most hacking attacks are NOT on the high profile and billion-dollar companies. By far, the most common targets are small to medium size businesses where the average “take” is $15,000. These are typically easier targets to crack and make up a hacker’s bread-and-butter revenue streams. Hacking cost the global economy an estimated $445 billion dollars last year. That’s serious money at stake, and a serious incentive for criminal organizations to continue increasing their operations.     Time and Effort Facts about Targeted Attacks...

Continue reading
Tags:
  2525 Hits

9 Truly Practical [Year-Round] IT Budget Tips for Making Your Work Life Easier

9 Truly Practical [Year-Round] IT Budget Tips for Making Your Work Life Easier
Practical IT Budget Tips for Making Your Work Life Easier “ There’s got to be an easier way ” may be a worn out cliché, but it’s seldom heard more often than in an IT department at budgeting time. Some people might enjoy it, but for most, the annual department budget is a real chore—yet so necessary. Believe me when I say that for IT departments, the annual budget can be a double-chore. It’s not just that Information Technology is more technical, with its evolving systems, hardware and software to account for. It’s the nature of our industry that unexpected “surprises” and events require frequent revisions, reviews and emergency upgrades during our budget periods. Plus we have no control over how often our system vendors provide software and driver updates, vulnerability patches, and bug-fixes that are becoming more frequent as the hacking world gets more dangerous and complex.   So here they are, our 9 Truly Practical [Year-Round] IT Budget Tips that will make your work life easier... (Editor’s note: Our thanks to   Tech Pro Research   who originally published much of our inspiration here in their annual CIO’s Guide)   The annual IT Budget may be a once-a-year exercise,...
Continue reading
  1903 Hits
© 2021 . All Rights Reserved. The IT Communication Group Inc Netcotech