<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Overwatch Cybertech</title>
	<atom:link href="https://owcybertech.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://owcybertech.com</link>
	<description>The Security You Expect: The Privacy You Deserve!</description>
	<lastBuildDate>Mon, 15 Feb 2021 18:28:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>The Dangers Within: Understanding Insider Threats</title>
		<link>https://owcybertech.com/the-dangers-within-understanding-insider-threats/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-dangers-within-understanding-insider-threats</link>
		
		<dc:creator><![CDATA[cfcadmin]]></dc:creator>
		<pubDate>Mon, 15 Feb 2021 18:15:12 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://owcybertech.com/?p=2628</guid>

					<description><![CDATA[<p>The year 2020 witnessed an unprecedented onslaught of cybersecurity threats across the world as the global workforce underwent a forced transition to remote working. However, not all cybersecurity threats come from the outside. In a study conducted by Bitglass, 61 percent of businesses surveyed reported...</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/the-dangers-within-understanding-insider-threats/">The Dangers Within: Understanding Insider Threats</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The year 2020 witnessed an unprecedented onslaught of cybersecurity threats across the world as the global workforce underwent a forced transition to remote working. However, not all cybersecurity threats come from the outside. In a study conducted by Bitglass, 61 percent of businesses surveyed reported at least one insider-related cybersecurity incident in the last year. This could be anything from negligent employees who lack cybersecurity training to rogue employees who facilitate a breach for personal gain.</p>
<p>Considering the increasing frequency of insider threats and the severity of data breaches resulting from them, it goes without saying that all organizations need to take proactive steps to combat this serious security risk.</p>
<p>Before taking any preventative security measures, it is necessary to understand who causes these risks and why. In this blog, we’ll discuss all aspects of insider threats including the motivations behind them, potential actors, primary targets, consequences and more.</p>
<h4><strong><br />
Actors Behind Insider Threats</strong></h4>
<p>Anyone with access to critical information can pose a potential insider threat if the information is unknowingly or maliciously misused, resulting in a data breach. Businesses need to identify these actors if they want to curb insider threats effectively.</p>
<p>Insider threat types can be classified as follows:</p>
<ul>
<li><strong>Negligent insiders</strong> – This may include careless executives or employees with access to privileged information. These insiders don’t have any motivation – money or otherwise. They are simply careless in their actions or may have fallen victim to a scam. For instance, in one particular incident involving an apparel manufacturer, a careless employee clicking one phishing link from his laptop was enough to compromise the entire network.</li>
<li><strong>Malicious insiders</strong> – These are insiders who intentionally abuse their credentials for personal gain. These actors have an advantage over external attackers since they have access to privileged information and are aware of the security loopholes. They may be motivated by monetary gain or may have a personal vendetta against the company.</li>
<li><strong>Contractors or vendors</strong> – Sometimes, even third-party vendors and contractors who have temporary access to an organization’s IT network can cause a data breach. The motivation in this case could also be money or vengeance. The US Army Reserves payroll system was once targeted in a similar attack, where a contractor who lost his contract activated a logic bomb to create a delay in delivering paychecks.</li>
</ul>
<p><strong><br />
Motivations Behind Malicious Insider Threats</strong></p>
<p>Malicious insiders are usually motivated by one or more of the following reasons:</p>
<p>&nbsp;</p>
<ul>
<li><strong>Money or greed</strong> – Most cases of non-negligent insider threats are motivated by money and personal financial gain. A greedy insider with access to restricted information is most often the culprit in this case. For example, two employees of General Electric stole the company’s intellectual property about calibrating turbines and started a competing firm with this information. After years of investigation, they were convicted in 2020.</li>
<li><strong>Revenge </strong>– Another familiar reason for insider threats involves revenge. Disgruntled employees, who believe they have been wronged by the company they once worked for, are usually behind this type of threat. In August 2020, a disgruntled former employee of Cisco deleted hundreds of virtual machines and caused about $1.4 million in damages to the company.</li>
<li><strong>Espionage </strong>– Many large organizations across the world have been victims of economic espionage from competing firms. This is mainly done to gain a competitive advantage in the market. A state-owned Chinese enterprise perpetrated espionage against American semi-conductor firm Micron by sending compromised insiders and stole valuable trade secrets.</li>
<li><strong>Strategic advantage</strong> – Intellectual property theft against large corporations is most often a result of trying to gain a strategic advantage in the market. Korean smartphone giant Samsung became a victim recently when its blueprint for bendable screen technology was stolen by its supplier.</li>
<li><strong>Political or ideological</strong> – There have been many documented cases of insider threats motivated by political or ideological factors. These cases often concern national pride or revenge against another nation for the attack.</li>
</ul>
<p><strong><br />
Why Insider Threats Are Dangerous</strong></p>
<p>Insider threats often have a massive impact on your data, primary assets and your bottom line. On top of it all, these threats are often hard to detect and contain. A study by the Ponemon Institute estimates that it takes 77 days on average to contain insider threats once detected.</p>
<ul>
<li><strong>Targets primary assets:</strong> Insider threats often target the primary assets of an organization including proprietary information, product information, business plans, company funds, IT systems and more.</li>
<li><strong>Results in huge costs:</strong> The same study by the Ponemon Institute estimated that the average cost of insider threats has increased 31 percent to $11.45 million in the last two years. These costs include downtime losses, loss of business transactions, loss of business opportunities and more.</li>
</ul>
<p>&nbsp;</p>
<p><strong>Don’t Wait to Protect Your Business</strong></p>
<p>Although the consequences of insider threats may be disastrous, you don’t have to face this problem alone. If you are wondering how you can mitigate these threats and prevent losses, we’ve got you covered. Reach out to us today to understand the different ways by which you can build a resilient cybersecurity posture against insider threats.</p>
<p>&nbsp;</p>
<p><em>Article curated and used by permission</em><em>.</em></p>
<p>&nbsp;</p>
<p>Data Sources:</p>
<p>&nbsp;</p>
<ul>
<li><a href="https://www.varonis.com/blog/insider-security-threats/">Bitglass</a> 2020 Insider Threat Report</li>
<li><a href="https://www.zdnet.com/article/how-one-hacked-laptop-led-to-an-entire-network-being-compromised/">https://www.zdnet.com/article/how-one-hacked-laptop-led-to-an-entire-network-being-compromised/</a></li>
<li><a href="https://www.theregister.com/2017/09/22/it_contractor_logic_bombed_army_payroll">https://www.theregister.com/2017/09/22/it_contractor_logic_bombed_army_payroll</a></li>
<li><a href="https://www.fbi.gov/news/stories/two-guilty-in-theft-of-trade-secrets-from-ge-072920">https://www.fbi.gov/news/stories/two-guilty-in-theft-of-trade-secrets-from-ge-072920</a></li>
<li><a href="https://www.bankinfosecurity.com/ex-cisco-engineer-pleads-guilty-in-insider-threat-case-a-14917">https://www.bankinfosecurity.com/ex-cisco-engineer-pleads-guilty-in-insider-threat-case-a-14917</a></li>
<li><a href="https://www.justice.gov/opa/pr/prc-state-owned-company-taiwan-company-and-three-individuals-charged-economic-espionage">https://www.justice.gov/opa/pr/prc-state-owned-company-taiwan-company-and-three-individuals-charged-economic-espionage</a></li>
<li><a href="https://edition.cnn.com/2018/11/30/tech/samsung-china-tech-theft/index.html">https://edition.cnn.com/2018/11/30/tech/samsung-china-tech-theft/index.html</a></li>
<li>IBM Cost of Insider Threats: Global Report 2020</li>
</ul>
<p>The post <a rel="nofollow" href="https://owcybertech.com/the-dangers-within-understanding-insider-threats/">The Dangers Within: Understanding Insider Threats</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Can’t Beat Free! Get Security Check on Your Computer Network, Devices</title>
		<link>https://owcybertech.com/cant-beat-free-get-security-check-on-your-computer-network-devices/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cant-beat-free-get-security-check-on-your-computer-network-devices</link>
		
		<dc:creator><![CDATA[cfcadmin]]></dc:creator>
		<pubDate>Tue, 04 Aug 2020 15:05:53 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://owcybertech.com/?p=2575</guid>

					<description><![CDATA[<p>If you or a loved one is diagnosed with a serious illness, you likely will seek a second medical opinion. But what if your computer network is ailing or file downloads or uploads are slowing? Would you seek a second opinion then, even if you...</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/cant-beat-free-get-security-check-on-your-computer-network-devices/">Can’t Beat Free! Get Security Check on Your Computer Network, Devices</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you or a loved one is diagnosed with a serious illness, you likely will seek a second medical opinion. But what if your computer network is ailing or file downloads or uploads are slowing? Would you seek a second opinion then, even if you have IT staff?</p>
<p>You should, of course, and you can’t beat free. Overwatch Technology offers a free on-site security assessment that takes from 30 minutes to two hours or so, depending on the complexity of your network and the number of connected devices. The security check includes:</p>
<ul>
<li>Antivirus protection</li>
<li>Firewall</li>
<li>Open ports</li>
<li>User devices</li>
<li>And much more</li>
</ul>
<p>Depending on your industry, other types of checks can be performed. For medical practices and other healthcare-related companies, for example, the security check includes a scan for unencrypted Social Security numbers that could lead to a HIPAA violation and a large monetary fine.</p>
<p>Computing devices are ubiquitous in modern life, at home, and at work. Unfortunately, malware is nearly as common. In a year-over-year survey, the number of organizations reporting malware that spread from one employee device to another <a href="https://www.comparitech.com/antivirus/malware-statistics-facts/">jumped from 64%</a> in 2018 to 71% in 2019. Reasons cited for the double-digit increase include evolving malware strategies that are becoming more subtle and a lack of employee cybersecurity training.</p>
<p>IT governance organization ISACA reports that 62% of cybersecurity professionals believe their organization’s IT cybersecurity function is understaffed, according to the 2020 State of Cybersecurity report. Fifteen percent believe that function is “significantly” understaffed, while 47% believe the function is “somewhat” understaffed.</p>
<p>At the same time, demand for IT staff across the cybersecurity spectrum continues to outpace the growth in those workers who have the requisite skills.</p>
<p>Think about it: More malware. Not enough IT staff with cybersecurity experience. More jobs than there are workers. This is why Overwatch Technology should be your security partner. Even if your company has IT staff, no one can keep up with every aspect of IT security. Our specialties include:</p>
<ul>
<li>Custom IT solutions that build on your current clients’ businesses and IT infrastructure</li>
<li>High-level security structures that protect you and your customers</li>
<li>User-focused tools and training that make implementing new systems easy</li>
<li>Long-term management of IT systems and infrastructure for clients</li>
</ul>
<p>Do you fix your own car or roof your house? Unless you have particular skills in either area, the answer is “no.” Likewise, IT security is a specialized field that requires constant learning and constant adapting to keep pace with hackers, ransomware, malware, phishing attacks, and much more.</p>
<p>It makes perfect sense to trust the experts at Overwatch Technology with the security of your network and devices.</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/cant-beat-free-get-security-check-on-your-computer-network-devices/">Can’t Beat Free! Get Security Check on Your Computer Network, Devices</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>8 Tips to Maintain Physical Data Security</title>
		<link>https://owcybertech.com/8-tips-to-maintain-physical-data-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=8-tips-to-maintain-physical-data-security</link>
		
		<dc:creator><![CDATA[cfcadmin]]></dc:creator>
		<pubDate>Tue, 28 Jul 2020 14:59:13 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://owcybertech.com/?p=2572</guid>

					<description><![CDATA[<p>The best antivirus, anti-malware, firewall-protecting software is worthless if you don’t take reasonable security precautions regarding your devices. Strong security isn’t just about the cyber domain of strong passwords, blocking malware, and managing permissions. You also safeguard sensitive information with physical security and cautious behavior....</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/8-tips-to-maintain-physical-data-security/">8 Tips to Maintain Physical Data Security</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The best antivirus, anti-malware, firewall-protecting software is worthless if you don’t take reasonable security precautions regarding your devices.</p>
<p>Strong security isn’t just about the cyber domain of strong passwords, blocking malware, and managing permissions. You also safeguard sensitive information with physical security and cautious behavior. Here are some non-technical security tips:</p>
<ol>
<li><strong>Keep an eye on your devices and never leave them with strangers</strong>. In addition, never walk away from a device you’ve logged in to. Companies that routinely handle protected health information or other personally identifiable information have policies that require employees to log off before leaving the device – even while working from home.</li>
<li><strong>Look for privacy in places like airports and coffee shops</strong>. Sit where no one can see over your shoulder. That may be difficult in especially busy places or at peak travel times, but do you really need to check your email or work on that presentation <em>now</em>?</li>
<li><strong>Dim the screen on your device or get a privacy filter</strong>. If you are in a public place and can’t find privacy, this will make it more difficult for strangers to see what’s on your device.</li>
<li><strong>Don’t discuss sensitive information in public areas.</strong> We’ve all heard the sales exec in the airport gate area loudly trying to close that deal. You’ve heard that, haven’t you? Recordings in public places are ubiquitous these days, so don’t say anything in a public area you wouldn’t want to see or hear on the internet.</li>
<li><strong>Get a case to protect your devices</strong>. How many times did you crack your cellphone’s screen before you bought your first protective case? A sturdy case or a cushioned bag for your laptop or tablet can soften any blows if your device is dropped or protect it if something is spilled on it.</li>
<li><strong>Bring a portable charger</strong>. Much like public Wi-Fi has been universally panned over security concerns, so have <a href="https://www.forbes.com/sites/suzannerowankelleher/2019/05/21/why-you-should-never-use-airport-usb-charging-stations/#7bf649865955">public charging stations</a> like those at airports. Plugging in can download malware to your device, potentially opening you up for a hack of sensitive information. A portable charger could be the answer, but remember to make sure it has a full charge before hitting the road.</li>
<li><strong>Consider alternatives to the public USB recharger</strong>. If you need to charge your phone, consider plugging the USB port into your laptop. It’s not optimal to top your phone to 100% power, but it should be enough to handle your immediate computing needs. You also can buy a data blocker for under $10, which, as the name implies, blocks the transfer of data from a charging station to a device.</li>
<li><strong>Carry your own AC adapter</strong>. If you use your laptop in a dock, for example, you may not remember to bring the AC adapter with you when you travel. If you issue laptops and docks to your employees, spend a little extra for a second adapter they can keep in the laptop bag. And for those with only one AC adapter, keep it in your laptop bag when not in use. Same goes for any portable chargers or other devices you use at home/office and also on the road.</li>
</ol>
<p>The post <a rel="nofollow" href="https://owcybertech.com/8-tips-to-maintain-physical-data-security/">8 Tips to Maintain Physical Data Security</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Outsourced Cybersecurity for MSPs: We Can Do That</title>
		<link>https://owcybertech.com/outsourced-cybersecurity-for-msps-we-can-do-that/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=outsourced-cybersecurity-for-msps-we-can-do-that</link>
		
		<dc:creator><![CDATA[cfcadmin]]></dc:creator>
		<pubDate>Tue, 21 Jul 2020 14:55:55 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://owcybertech.com/?p=2569</guid>

					<description><![CDATA[<p>As everyone knows, technology has quickly become the center of our lives. Streaming Netflix while instant messaging friends and shopping online is so 2019. Walk around your town, and it’s likely that more pedestrians than not will be on their phones. The reliance of technology...</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/outsourced-cybersecurity-for-msps-we-can-do-that/">Outsourced Cybersecurity for MSPs: We Can Do That</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As everyone knows, technology has quickly become the center of our lives. Streaming Netflix while instant messaging friends and shopping online is so 2019. Walk around your town, and it’s likely that more pedestrians than not will be on their phones.</p>
<p>The reliance of technology holds true in the business world, too. Few companies rely on physical spreadsheets and manual processes when technology can deliver a better user experience quickly and cheaply. We are accustomed to relying on third-party suppliers of, well, nearly everything. We don’t hail taxis anymore – we use an Uber or Lyft app. Hotels are passé, while Airbnb remains in vogue.</p>
<p>Companies of all sizes increasingly rely on managed service provider (MSPs) to remotely monitor and manage their IT infrastructure, from workstations and servers to network connectivity, firewalls and much more. Such an arrangement is often cheaper than employing staff directly and such arrangements are governed by service level agreements to support service quality, uptimes and response times for critical issues.</p>
<p>MSPs also should be providing cybersecurity, but finding (and affording) qualified cybersecurity staff has long been a challenge. That’s why MSPs rely on Overwatch Technology to provide a comprehensive artificial intelligence approach to scan networks and devices for anomalies in system behavior, including detection and prevention of viruses, malware, spyware and data breaches.</p>
<p>If you use an MSP to manage your network, Overwatch Technology could be hard at work behind the scenes, because some MSPs choose to hide their association with a third-party supplier. Other MSPs prefer that the association be out in the open. If the latter arrangement, an MSP client with a cybersecurity issue calls us directly.</p>
<p>Even if your company has its own in-house IT staff, is cybersecurity a specialty of anyone in that group? Cybersecurity is a highly specialized field, so much so that as many as 3.5 million cybersecurity <a href="https://cybersecurityventures.com/jobs/">jobs will go unfilled</a> globally by 2021. The U.S. Bureau of Labor Statistics says that the cybersecurity field is expected to <a href="https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm">grow 32%</a> between 2018-2028 versus a general job growth of just 5%.</p>
<p>Qualified cybersecurity professionals are as rare as hen’s teeth, so make sure that any MSP you use has qualified cybersecurity personnel on staff. Better yet, rely on Overwatch for all of your cybersecurity needs. We only hire the best and make sure that your company’s computing assets and network stay clear of viruses and malware.</p>
<p>That’s our promise to you.</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/outsourced-cybersecurity-for-msps-we-can-do-that/">Outsourced Cybersecurity for MSPs: We Can Do That</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Banking IT Security Lapse Enough to Make One Cry</title>
		<link>https://owcybertech.com/banking-it-security-lapse-enough-to-make-one-cry/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=banking-it-security-lapse-enough-to-make-one-cry</link>
		
		<dc:creator><![CDATA[cfcadmin]]></dc:creator>
		<pubDate>Tue, 14 Jul 2020 16:59:41 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://owcybertech.com/?p=2563</guid>

					<description><![CDATA[<p>The bank manager called me crying because it was obvious something was terribly, terribly wrong with her laptop. Sure enough, the device had two viruses on it that would allow full administrative access to the bank. We ran a scan on all devices connected to...</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/banking-it-security-lapse-enough-to-make-one-cry/">Banking IT Security Lapse Enough to Make One Cry</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The bank manager called me crying because it was obvious something was terribly, terribly wrong with her laptop.</p>
<p>Sure enough, the device had two viruses on it that would allow full administrative access to the bank. We ran a scan on all devices connected to the bank network and locked all outside ports.</p>
<p>What did the report show? In addition to more than 250 viruses on every machine, a dark web search for bank employee email addresses found that 65 had been hacked, including details on the CFO. If my company had accounts there, I would have closed my accounts and run in the opposite direction.</p>
<p>Yes, it seems that cybercrime is everywhere and that dealing with issues is just part of the price for being in the business world. But certain industries have a much greater responsibility to keep data protected, and financial services ranks among the most regulated.</p>
<p>Here&#8217;s a sampling of the regulations that banks, credit unions and other institutions that handle money must adhere to:</p>
<ul>
<li>Bank Secrecy Act. This has been the primary anti-money laundering tool since its inception in 1970. The act got more teeth in the form of the USA Patriot Act, enacted following the Sept. 11 bombings that requires banks to verify the identities of those opening accounts.</li>
<li>Fair and Accurate Credit Transactions Act (FACTA). Although its primary purpose is to improve the accuracy of credit reports and allow consumers one free report each year, the act has identity theft measures and requires security regarding the disposal of consumer information.</li>
<li>Financial Crimes Enforcement Network (FinCEN). A bureau within the U.S. Treasury Department, the agency analyzes financial transactions to combat financial crimes.</li>
<li>Gramm-Leach-Bliley Act. Passed in 1999, the act enforces rules regarding the security of personal financial information related to how financial institutions collect and protect such information.</li>
<li>Office of Foreign Assets Control (OFAC). This organization maintains the Specially Designated Nationals List (SDN List), entities that U.S. businesses are forbidden to engage with financially.</li>
</ul>
<p>Oh yeah, and there’s some global pandemic out there, which has roiled financial markets and left financial institutions struggling to make a profit amid record low-interest rates. At times like these, it’s no wonder that the bank manager lost sight into the well-being of her work laptop, but that’s not a risk that banks and credit unions should be taking.</p>
<p>Overwatch Technology can help banks and credit unions carry the burden of regulatory compliance without the high overhead associated with in-house IT staff. We find that banks often aren’t on top of compliance management, with written documentation in place regarding how an institution safeguards information and business associate agreements in place with vendors.</p>
<p>Technology and compliance management are required to truly keep data safe and customers protected. Fortunately, you can find both services at one place: Overwatch.</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/banking-it-security-lapse-enough-to-make-one-cry/">Banking IT Security Lapse Enough to Make One Cry</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Healthcare Providers Should Take Protecting Patient Information Seriously</title>
		<link>https://owcybertech.com/healthcare-providers-should-take-protecting-patient-information-seriously/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=healthcare-providers-should-take-protecting-patient-information-seriously</link>
		
		<dc:creator><![CDATA[cfcadmin]]></dc:creator>
		<pubDate>Mon, 06 Jul 2020 16:28:40 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://owcybertech.com/?p=2559</guid>

					<description><![CDATA[<p>Medical office and other healthcare providers that handle protected health information (PHI) are required to comply with various federal statutes, including HIPAA, fraud statutes, and prohibitions against self-referral. The Office of Inspector General (OIG), which is part of the U.S. Department of Health and Human...</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/healthcare-providers-should-take-protecting-patient-information-seriously/">Healthcare Providers Should Take Protecting Patient Information Seriously</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Medical office and other healthcare providers that handle protected health information (PHI) are required to comply with various federal statutes, including HIPAA, fraud statutes, and prohibitions against self-referral.</p>
<p>The Office of Inspector General (OIG), which is part of the U.S. Department of Health and Human Services, has identified <a href="https://oig.hhs.gov/compliance/provider-compliance-training/files/Compliance101tips508.pdf">seven basic elements</a> considered fundamental to any compliance plan. Below you will find each step in OIG’s “The Seven Fundamental Elements of an Effective Compliance Program.”</p>
<p><strong>Implementing written policies, procedures, and standards of conduct</strong>. Having a written plan is a foundational step in any compliance effort. Outline what should happen in the event of a data breach, an intruder, a misplaced laptop, and other likely scenarios for your business. Other potential issues to deal with include physical building security, how to handle visitors and vendors. Policies and procedures should be reviewed periodically and shared with employees.</p>
<p><strong>Designating a compliance officer and compliance committee. </strong>Every business that handles PHI should have a compliance officer. Everyone should know who the compliance officer is, and that person should take the responsibility seriously. Fines have been levied at companies without compliance officers.</p>
<p>That person (or, ideally a group of people) should be responsible for day-to-day security issues. For example, users should log off computers when they leave—even for a minute. If patient data is displayed on an unsecured computer where visitors, vendors, or unauthorized users can access it, that is considered a breach.</p>
<p><strong>Conducting effective training and education. </strong>Privacy and security issues should be part of new employee training, but smart companies require annual training for all employees on data privacy and security. It might be the same basic information year over year, but the reinforcement is critical to underscore the importance of keeping data safe.</p>
<p><strong>Developing effective lines of communication.</strong> How does your company communicate security policies? In even the smallest offices, email security reminders and tips frequently to keep top-of-mind awareness among employees. These emails should come from the compliance officer and include that person’s contact information.</p>
<p><strong>Conducting internal monitoring and auditing.</strong> Enforcing security policies daily might make you lose sight of the need for longer-term monitoring and auditing. However, both are important. Don’t overlook the physical security of your computing devices, your network, your firewall, and other computing components. A security system is only as strong as its weakest link, be it an employee who leaves a door unlocked or one who clicks on an email to release malware into your computer system.</p>
<p><strong>Enforcing standards through well-publicized disciplinary guidelines.</strong> A major security lapse or intentional misuse of PHI should be a firing offense. While no one wants to take such drastic action, information privacy and security is that important. Depending on the severity of the infraction, consider a verbal warning for a first offense, a written warning on second offense, and termination for another lapse.<strong> </strong></p>
<p><strong>Responding promptly to detected offenses and undertaking corrective action.</strong> While you hope never to put a data privacy and security plan into place, you must have one. The OIG looks for dynamic data security plans that get reviewed and tested, not those that sit on shelves. No company can anticipate every possible data security or privacy event, but proper and continual education goes a long way toward creating a security-first mindset among your employees and managers.</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/healthcare-providers-should-take-protecting-patient-information-seriously/">Healthcare Providers Should Take Protecting Patient Information Seriously</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beware the Criminal (or Idiot) Within</title>
		<link>https://owcybertech.com/beware-the-criminal-or-idiot-within/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=beware-the-criminal-or-idiot-within</link>
		
		<dc:creator><![CDATA[jeremy]]></dc:creator>
		<pubDate>Tue, 09 Jun 2020 21:38:22 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://owcybertech.com/?p=2555</guid>

					<description><![CDATA[<p>Every computing device in every home and business should employ basic security protocols. Virus and malware protection. Firewall. Encryption for sensitive data or business use of personal devices. &#160; Any article on basic cybersecurity tips and advice inevitably focuses on habits to protect against external...</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/beware-the-criminal-or-idiot-within/">Beware the Criminal (or Idiot) Within</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Every computing device in every home and business should employ basic security protocols. Virus and malware protection. Firewall. Encryption for sensitive data or business use of personal devices.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Any article on basic cybersecurity tips and advice inevitably focuses on habits to protect against external threats, which provides a necessary foundation. In that way, think of security as a moat, protecting assets from outsiders. </span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">However, not all security threats come from outside. A company’s workers can be threats as well, in incidents ranging from accidents to negligence to malicious behavior. Taking the medieval analogy further, think of insiders like the envious nephew who plots to steal the crown or the inattentive servant who leaves a critical door open at the wrong time.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">A recent survey of IT leaders showed that 78% think employees have accidentally put data at risk in the last 12 months, and 75% believe workers have </span><a href="https://www.helpnetsecurity.com/2020/02/24/insider-data-breaches/"><span style="font-weight: 400;">risked data intentionally</span></a><span style="font-weight: 400;">. When asked about the impact of a breach, 41% indicated financial data would be the greatest impact area. Four in 10 employees from the same survey said they had accidentally leaked data because of a phishing attack, and one-third said they had caused a breach by sending information to the wrong person.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">According to a 2019 breach report, nearly </span><a href="https://databreachcalculator.mybluemix.net/?_ga=2.107104256.306338611.1590947289-750883338.1590947289&amp;_gac=1.259263224.1590947289.CjwKCAjwq832BRA5EiwACvCWsRoIIGw-KY2q4ZVUnVroUWIqA1UhRUeV0MfU7_AS2hiIPuKcC7AmoBoC4igQAvD_BwE&amp;cm_mc_uid=68799072466115801359311&amp;cm_mc_sid_50200000=88732881590947288781&amp;cm_mc_sid_52640000=51248581590947288806"><span style="font-weight: 400;">one-half of all breaches</span></a><span style="font-weight: 400;"> were caused by malicious or criminal attacks. And attacks cost companies more to remediate than system glitches or human error/negligence, about $30 more per record.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Finally, most companies are reactive, rather than proactive, in their detection capabilities. Only 29% of organizations said they </span><a href="https://www.opentext.com/info/security/endpoint-security-sans-survey?ldsrc=Marketing%20-%20Paid%20Inbound&amp;elqcampaignid=43899&amp;utm_source=google&amp;utm_medium=ppc&amp;utm_campaign=endpoint-security-ppc-textad&amp;gclid=CjwKCAjwq832BRA5EiwACvCWscT0xZb1kU0IH3k9dcQ_AjCik1dZph3zQevUJ-b35c-VK1z6zOyc9xoCLNgQAvD_BwE"><span style="font-weight: 400;">successfully prevented</span></a><span style="font-weight: 400;"> an attack through proactive discovery, but they were successful less than 10% of the time.  </span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Any employee with network permissions can inadvertently delete or compromise data. Although this would be characterized as an accident, rather than malicious, the impact can be nearly as bad. Then there’s negligence. Sometimes employees violate security policies or best practices through well-intentioned, but harmful, actions or inattention.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Lastly, there are malicious insiders. The classic example is the fired employee who absconds with sensitive data to sell or who uses still-active login credentials to access and harm business accounts.</span></p>
<p><span style="font-weight: 400;">Single sign-on and multifactor authentication can go a long way toward keeping data safe. When properly configured, single sign-on validates authorized users to access company resources. If an employee quits or is terminated, deleting the sign-on cancels employee access to company systems.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Configuring single sign-on based on a user’s job title or area of authority can create additional barriers to protect company data. If you’re not in the Finance office, for example, you have no business being in general ledger files. If you are a manager, you may need more access to certain files than your direct reports.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Multifactor authentication takes security to the next level, requiring an additional step before allowing access to data.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Overwatch Technology can help businesses manage single sign-on and control data access. Even one incident can tarnish the reputation of a business and leave it open to federal, state or local scrutiny, depending on the industry.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Organizations should take insider threats into account when formulating security plans because any breach—regardless of the cause—is one too many.</span></p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/beware-the-criminal-or-idiot-within/">Beware the Criminal (or Idiot) Within</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity for Law Firms Is No Laughing Matter</title>
		<link>https://owcybertech.com/cybersecurity-for-law-firms-is-no-laughing-matter/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cybersecurity-for-law-firms-is-no-laughing-matter</link>
		
		<dc:creator><![CDATA[jeremy]]></dc:creator>
		<pubDate>Tue, 02 Jun 2020 20:51:31 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://owcybertech.com/?p=2548</guid>

					<description><![CDATA[<p>How many lawyers does it take to prevent a data breach or a malware intrusion? Just one, the one who calls Overwatch Technology and lets us handle the rest. Attorneys have a reputation for being Luddites, those who get dragged into the modern era kicking...</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/cybersecurity-for-law-firms-is-no-laughing-matter/">Cybersecurity for Law Firms Is No Laughing Matter</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How many lawyers does it take to prevent a data breach or a malware intrusion? Just one, the<br />
one who calls <a href="info@overwatch.technology">Overwatch Technology</a> and lets us handle the rest.</p>
<p>Attorneys have a reputation for being Luddites, those who get dragged into the modern era<br />
kicking and screaming. And results from the American Bar Association’s 2019 <a href="https://www.americanbar.org/groups/law_practice/publications/techreport/abatechreport2019/cybersecurity2019/">Cybersecurity</a><br />
Report bears this out:</p>
<ul>
<li>Nearly 40% of respondents didn’t know whether their systems were protected from<br />
viruses and malware</li>
<li> 36% had been infected</li>
<li>26% don’t know if they had been affected.</li>
</ul>
<p>Firm that experienced infections reported downtime to deal with the incident (40%),<br />
consulting fees and remediation (32%) and loss of network access (23%).</p>
<p>Regarding data breaches:</p>
<ul>
<li> 26% reported a breach</li>
<li>    19% didn’t know</li>
<li>    55% declined to answer the question</li>
</ul>
<p>Not only is data security good business, it’s also codified in three Model Rules of<br />
Professional Conduct and a Formal Opinion. Rule 1.1 regards “competent representation to a<br />
client.” Comment 8 on the rule says an attorney should keep up with changes in the law and<br />
its practice, “including the benefits and risks associated with relevant technology.”</p>
<p>Rule 1.4 regards client communication, which increasingly occurs through electronic means<br />
that must be kept secure. Rule 1.6(c) is more explicit still: “A lawyer shall make reasonable<br />
efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to,<br />
information relating to the representation of a client.” A comment on this rule weighs<br />
reasonable efforts versus the sensitivity of the information and the cost/difficulty of<br />
employing safeguards. Few would argue that commonplace data security methods used in<br />
other industries would represent either a difficulty or cost challenge.</p>
<ul>
<li>Finally, ABA Formal Opinion 477 says that attorneys may need to employ heightened<br />
security precautions when required by a client agreement or a law or when the nature of the<br />
information requires a higher degree of security. Seven factors to consider to determine the<br />
right level of cybersecurity include:</li>
<li>Nature of potential threats</li>
<li>How client confidential info is stored and sent</li>
<li>Use of reasonable electronic security measures</li>
<li>Protecting electronic communications</li>
<li>Need to label client information as privileged and confidential</li>
<li>Training for lawyers and nonlawyer assistants</li>
<li>Due diligence on vendors who provide technology services</li>
</ul>
<p>Whether you’re a sole practitioner or part of a 500-plus attorney law firm, keeping company<br />
and client information secure should be a core competency. At Overwatch Technology,<br />
helping law firms manage their technology assets and keep their data secure is one of our core</p>
<p>competencies. We help law firms large and small, providing top-notch security at a reasonable price.</p>
<p>What do you have to lose? Only your reputation and the trust of your clients.</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/cybersecurity-for-law-firms-is-no-laughing-matter/">Cybersecurity for Law Firms Is No Laughing Matter</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>‘Don’t Be Stupid’ the First Rule of Cybersecurity</title>
		<link>https://owcybertech.com/dont-be-stupid-the-first-rule-of-cybersecurity/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=dont-be-stupid-the-first-rule-of-cybersecurity</link>
		
		<dc:creator><![CDATA[jeremy]]></dc:creator>
		<pubDate>Wed, 27 May 2020 14:55:53 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://owcybertech.com/?p=2535</guid>

					<description><![CDATA[<p>We’ve all done stupid things in our lives, but you must be smart when it comes to the security ofyour electronic devices. Do you keep credit card details on your phone or in the checkout features of a website where youfrequently buy things? Chances are that...</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/dont-be-stupid-the-first-rule-of-cybersecurity/">‘Don’t Be Stupid’ the First Rule of Cybersecurity</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2535" class="elementor elementor-2535" data-elementor-settings="[]">
						<div class="elementor-inner">
							<div class="elementor-section-wrap">
							<section class="elementor-section elementor-top-section elementor-element elementor-element-66f28d8a elementor-section-boxed elementor-section-height-default elementor-section-height-default parallax_section_no qode_elementor_container_no" data-id="66f28d8a" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
							<div class="elementor-row">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2681094a" data-id="2681094a" data-element_type="column">
			<div class="elementor-column-wrap elementor-element-populated">
							<div class="elementor-widget-wrap">
						<div class="elementor-element elementor-element-5be8ce5d elementor-widget elementor-widget-text-editor" data-id="5be8ce5d" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
					<div class="elementor-text-editor elementor-clearfix"><div id="ember138" class="dh-page ember-view" data-model-id="jzZV17xv1NRRdKrL5mDJ9G"><div class="dh-page-padding"><div id="ember147" class="dh-page-objects-wrap ember-view"><div id="ember236" class="dh-page-object text ember-view">We’ve all done stupid things in our lives, but you must be smart when it comes to the security of</div><div id="ember238" class="dh-page-object text ember-view">your electronic devices.</div><div> </div><div id="ember240" class="dh-page-object text ember-view">Do you keep credit card details on your phone or in the checkout features of a website where you</div><div id="ember242" class="dh-page-object text ember-view">frequently buy things? Chances are that you do, so it’s imperative that you up your security</div><div id="ember244" class="dh-page-object text ember-view">game. A recent breach analysis found more than <a href="https://www.ncsc.gov.uk/news/most-hacked-passwords-revealed-as-uk-cyber-survey-exposes-gaps-in-online-security">23 million victims</a> who were hacked used</div><div id="ember246" class="dh-page-object text ember-view">“123456” as a password. That’s not smart in anyone’s book.</div><div> </div><div id="ember248" class="dh-page-object text ember-view">That’s an obvious example of what not to do, but keep these five things in mind at work and in</div><div id="ember250" class="dh-page-object text ember-view">your own life to safeguard electronic privacy.</div><div> </div><div id="ember252" class="dh-page-object text ember-view">1. Use strong passwords (longer is better!) and change them regularly. It seems like every</div><div id="ember256" class="dh-page-object text ember-view">site where you shop, read or interact wants to have a relationship that starts with a user</div><div id="ember258" class="dh-page-object text ember-view">name and password. It can be exhausting to try and keep up with so many user names and</div><div id="ember260" class="dh-page-object text ember-view">so many passwords. But it’s critical.</div><div id="ember262" class="dh-page-object text ember-view">Overwatch Technology recently performed a security assessment for a client and 30</div><div id="ember264" class="dh-page-object text ember-view">users. Of those 30 users, 19 were found to have passwords that we’re sufficiently</div><div id="ember266" class="dh-page-object text ember-view">sophisticated.</div><div id="ember268" class="dh-page-object text ember-view">2. Keep your sensitive login credentials private. This strongly correlates with the first</div><div id="ember272" class="dh-page-object text ember-view">reason, and the solution is the same—use a password manager to keep track of saved user</div><div id="ember274" class="dh-page-object text ember-view">names and passwords. All you have to remember is a single password that unlocks</div><div id="ember276" class="dh-page-object text ember-view">everything else. Even then, be sure to change that password once every four months or so</div><div id="ember278" class="dh-page-object text ember-view">to be extra-safe.</div><div id="ember280" class="dh-page-object text ember-view">3. Be wary of opening emails and attachments from sources that you don’t recognize. The</div><div id="ember284" class="dh-page-object text ember-view"><a href="https://www.cnbc.com/2019/04/18/nigerian-prince-scams-still-rake-in-over-700000-dollars-a-year.html">Nigerian prince</a> email scam has been around nearly as long as the internet has, but it</div><div id="ember286" class="dh-page-object text ember-view">netted fraudsters $700K in the U.S. alone in 2019! That’s nearly impossible to believe.</div><div id="ember288" class="dh-page-object text ember-view">People are being more cautious about emails and attachments, but the fraudsters have</div><div id="ember290" class="dh-page-object text ember-view">been upping their game, too, improving the quality of their emails.</div><div id="ember292" class="dh-page-object text ember-view">If you’re not expecting an email from FedEx, Amazon or your bank, tread cautiously.</div><div id="ember294" class="dh-page-object text ember-view">Same goes for an email from anyone you don’t know. At the same time, check your junk</div><div id="ember296" class="dh-page-object text ember-view">or spam folders occasionally, because legitimate emails can get incorrectly logged.</div><div id="ember298" class="dh-page-object text ember-view">4. Don’t install software or connect hardware to your company’s network without</div><div id="ember302" class="dh-page-object text ember-view">permission. If you’re using a company device, hopefully it’s been partitioned for business</div><div id="ember304" class="dh-page-object text ember-view">use, with restrictions about what can be downloaded or accessed from the device. Your</div><div id="ember306" class="dh-page-object text ember-view">business device isn’t yours, so imagine that every website you visit or file you download</div><div id="ember308" class="dh-page-object text ember-view">is visible to IT staff—because it could be.</div><p><button id="ember310" class="dh-page-object link cursor-pointer ember-view"></button><button id="ember312" class="dh-page-object link cursor-pointer ember-view"></button>5. When working from home, make sure your internet connection is secure. If you are</p></div></div></div><div id="ember141" class="dh-page ember-view" data-model-id="aVp7dP8vp7XXA23q4NxXg2"><div class="dh-page-padding"><div id="ember150" class="dh-page-objects-wrap ember-view"><div id="ember318" class="dh-page-object text ember-view">accessing company servers through the cloud, hopefully your company has provided a</div><div id="ember320" class="dh-page-object text ember-view">secure VPN connection to access those resources. At the very least, your computing</div><div id="ember322" class="dh-page-object text ember-view">device should have a strong, top-rated firewall to prevent unwanted intrusions.</div><div id="ember324" class="dh-page-object text ember-view"> </div><div id="ember324" class="dh-page-object text ember-view">Have questions about the privacy and security of your devices? Overwatch Technology’s</div><div id="ember326" class="dh-page-object text ember-view"><a href="https://owcybertech.com/vulnerability-management/">Vulnerability Management</a> services can put your mind at ease, evaluating the security of your</div><div id="ember328" class="dh-page-object text ember-view">network, devices, internet traffic, passwords and more. Specific services include Patch</div><div id="ember330" class="dh-page-object text ember-view">Management, Firewall Checker, Virus Checker and Traffic Monitoring, with easy-to-read</div><div id="ember332" class="dh-page-object text ember-view">dashboards to show where you stand.</div><div> </div><div id="ember334" class="dh-page-object text ember-view">The smartest approach is to not do anything stupid to begin with.</div></div></div></div></div>
				</div>
				</div>
						</div>
					</div>
		</div>
								</div>
					</div>
		</section>
						</div>
						</div>
					</div>
		<p>The post <a rel="nofollow" href="https://owcybertech.com/dont-be-stupid-the-first-rule-of-cybersecurity/">‘Don’t Be Stupid’ the First Rule of Cybersecurity</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Backing Up Your Data a Smart Move to Thwart Ransomware</title>
		<link>https://owcybertech.com/backing-up-your-data-a-smart-move-to-thwart-ransomware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=backing-up-your-data-a-smart-move-to-thwart-ransomware</link>
		
		<dc:creator><![CDATA[jeremy]]></dc:creator>
		<pubDate>Wed, 20 May 2020 02:28:35 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://owcybertech.com/?p=2532</guid>

					<description><![CDATA[<p>Backing Up Your Data a Smart Move to Thwart Ransomware Does your automobile have a backup camera? Even before the National Highway Traffic Safety Administration mandated backup cameras in 2018, 97% of 2018 models already were compliant, compared to just 6% of models in 2006....</p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/backing-up-your-data-a-smart-move-to-thwart-ransomware/">Backing Up Your Data a Smart Move to Thwart Ransomware</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<ol>
<li><span style="font-weight: 400;">Backing Up Your Data a Smart Move to Thwart Ransomware</span></li>
</ol>
<p><span style="font-weight: 400;">Does your automobile have a backup camera? Even before the National Highway Traffic Safety Administration mandated backup cameras in 2018, </span><a href="https://money.cnn.com/2018/05/02/news/cars-backup-cameras/"><span style="font-weight: 400;">97% of 2018 models</span></a><span style="font-weight: 400;"> already were compliant, compared to just 6% of models in 2006. It’s a great idea whose time had come.</span></p>
<p><span style="font-weight: 400;">So what about your business files? Are they properly backed up as part of a disaster recovery plan and a protection against ransomware? Although data security is as critical as vehicular safety, I’ll guess that much fewer than 97% of businesses are properly protected.</span></p>
<p><span style="font-weight: 400;">Every computer user should have a data backup plan, but it’s critical for business users. While you may have taken a break while sheltering at home, hackers did not. They are working 24/7/365 to access your data. Between February and April, cyberattacks aimed at </span><a href="https://www.carbonblack.com/resource/modern-bank-heists-3-0/"><span style="font-weight: 400;">financial institutions</span></a><span style="font-weight: 400;"> increased 238%.  </span></p>
<p><span style="font-weight: 400;">Should your data get hijacked, you may think about </span><a href="https://news.sophos.com/en-us/2020/05/12/the-state-of-ransomware-2020/"><span style="font-weight: 400;">paying the ransom</span></a><span style="font-weight: 400;">, but studies show that taking steps to restore or recreate your data costs one-half of what paying the ransom does. You may get your data back, but you may not. In any case, paying a ransom plus incurring remediation costs indicate that it’s cheaper to restore your data from a backup.</span></p>
<p><span style="font-weight: 400;">Overwatch can help devise a backup solution for your business and make recommendations on the best backup services.</span></p>
<p><span style="font-weight: 400;">For financial institutions, we recommend Datto. This backup is hardware-driven on premise or in the cloud. If an institution loses or employees are working from home, data can be accessed in the cloud. Two other backup vendors we’re keen on are Unitrends and Veeam. Unitrends is geared from the SMB to the enterprise with a variety of backup options. More than 80% of the Fortune 500 use Veeam, which has 375,000 customers.</span></p>
<p><span style="font-weight: 400;">The recommendation we make depends on many factors, including your industry type, the special data security/privacy needs of your industry, and your specific objectives. We constantly research vendors to discover the best ones that meet the needs of our clients.</span></p>
<p><span style="font-weight: 400;">Putting the possibility of ransomware aside, every business should have a comprehensive data backup plan as part of its security protocol. The backup rule of thumb is 3-2-1.  </span></p>
<p><span style="font-weight: 400;">You should have </span><b>three</b><span style="font-weight: 400;"> copies or versions of company data. Most good backup systems make multiple copies, which will become important should you need to revert recordkeeping to a time period prior to an attack or a data loss.</span></p>
<p><span style="font-weight: 400;">This data should be stored in </span><b>two</b><span style="font-weight: 400;"> different ways. For example, you could have two cloud copies from different time periods and a server backup. </span></p>
<p><b>One</b><span style="font-weight: 400;"> copy of your data should be stored in an alternate location. If you backed up your data in your company’s server room and kept a hard-drive copy in your desk, for example, a fire would wipe out everything.</span></p>
<p><span style="font-weight: 400;">To recap, three copies, two different data types and one alternative location will go a long way toward safeguarding your data.</span></p>
<p><a href="https://owcybertech.com/contact-us/"><span style="font-weight: 400;">Contact Overwatch Technology</span></a><span style="font-weight: 400;"> for help determining what the best backup solutions are for your business. </span></p>
<p>The post <a rel="nofollow" href="https://owcybertech.com/backing-up-your-data-a-smart-move-to-thwart-ransomware/">Backing Up Your Data a Smart Move to Thwart Ransomware</a> appeared first on <a rel="nofollow" href="https://owcybertech.com">Overwatch Cybertech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
