Posts by The Abacus Blog Team
Mitigating Risks From BYOD Policies
The ubiquity of cloud-based computing and similar technologies has made data and work more accessible to employees, even outside the workplace. Combined with the popularity of smartphones and other mobile devices – basic essentials in today’s tech-rich environment – it’s no surprise that bring-your-own-device (BYOD) policies have been considered by many companies. But how should…
Read More5 Ways Banks Can Protect Themselves Against Internal Cyber Attacks
Cybersecurity remains to be one of a bank’s most significant concerns, most especially because of the interconnectivity of financial institutions. And while most common threats come from outside groups, internal cyber security flaws are just as important – and often underlooked. So how can banks protect themselves against internal cyber attacks? First is to make…
Read MoreA New Report Shows Ransomware is on the Rise. And Small Businesses are the Target.
Webinar: Michael DePalma from Datto Corp. joins us to discuss ransomware and how you can protect your business.
Read MoreThe Rise of DDOS Attacks and How Banks Can Protect Themselves Against It
DDOS attacks are a simple yet effective way of shutting down websites, which deny access to legitimate users and lockdown essential services. For this reason, DDOS attacks are dangerous for banking organizations, which rely on 24/7 access to their services and usually safeguard enormous amounts of personal data and finances. So what can banks do…
Read MoreHow Often Should You Upgrade Servers?
Old servers are a company liability that usually isn’t addressed until it’s already too late. Many business owners often underestimate the current state of their servers, which makes them more prone to breaking down. Others can simply not have the resources to address this problem, particularly small to medium enterprises. But how often should you…
Read MoreShadow IT: What It Is and How It Might Be Putting Your Network At Risk
Cloud-based computing services and applications are some of the greatest innovations that the business sector has seen in recent years. With the ability to access, edit, and share data in real-time with no local point of access, cloud-based software has made the workplace more efficient. So what does shadow IT have to do with this?…
Read MoreNext-Generation Firewalls: Do You Need One?
Business firewalls are an essential part of any company’s data security measures. Since they provide the protections needed to keep the company and its clients’ data safe, no business can operate well without one. But cyberattacks become more sophisticated over time – which means defenses like firewalls should change in response to them. Do you…
Read MoreWhat Is Social Engineering And How Does It Work
On the TV show Jimmy Kimmel Live!, a segment called “What is Your Password?” shows what happens when a correspondent on the street asks people what their online passwords are. Surprisingly, some people do give out their entire passwords after being prompted with questions. Although the segment is funny, it also shows you how easily…
Read MoreWhat Do I Do if My Office 365 Account Has Been Hacked
Among Office 365 customers, it is fairly common to get security support requests for remediating compromised accounts. When hackers manage to obtain the password for an Office 365 account, they would have access to information directly coming from a member of a specific organization, posing plenty of dangers for internal and external contacts alike. So…
Read MoreWhat Is an EDR Tool?
Business networks are always a favorite target for different cyberattacks, which is why it’s important to find new ways to protect your network. One way you can do this is by adding a new layer of protection – like EDR – to the security system. To find out how EDR tools improve the company’s security…
Read More