by Performance Connectivity | Jul 1, 2019 | Compliance, Cyber Security
What is Endpoint Protection? Endpoints are vulnerable access points for cyber criminals to enter your network. Once inside, hackers can take control of the device to execute a DoS attack, steal high-value information or hold it for ransom. Traditionally, antivirus has...
by Performance Connectivity | Mar 27, 2019 | Best Practices, Cyber Security
In a recent incident reported in US news, an office secretary unknowingly gave some of her law firm’s most private data to a gentleman who had bought a Comcast Cable polo shirt off eBay. He dressed in khakis with a tool belt, and told the secretary he was there to...
by Performance Connectivity | Mar 20, 2019 | Best Practices, Cyber Security
Want to know what every hacker hopes you believe? “We’re small…nobody wants to hack us.” This is the #1 reason why people (companies) get hacked. They dismiss the importance of IT security because they’re only a “small business.” This is a lazy, irresponsible excuse....
by Performance Connectivity | Mar 13, 2019 | Best Practices, Cyber Security
YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but...
by Performance Connectivity | Jan 22, 2019 | Best Practices, Compliance, Cyber Security
Small and mid-sized businesses are being increasingly targeted by hackers. Their data is being exploited, held ransom, sold and corrupted. This kind of disaster can crush the public faith in your business, result in expensive fines, and even shutter your business for...