About Sandra Viveiros

This author has not yet filled in any details.
So far Sandra Viveiros has created 128 blog entries.

Double your privacy, double your fun!

By |2020-10-15T09:58:33-04:00October 15th, 2020|Cyber Security Awareness, National Cyber Security Awareness Month, Uncategorized|

Multi-factor authentication” is a tech industry term for using different types of verification to get into an account. The idea is that you use multiple things at the same time to really prove that you’re actually you. A password is one example of a factor; a fingerprint is another. Multi-factor authentication makes it much harder for hackers to break into people’s accounts. If they have one password but not the other one or two factors that they need, then they can’t get into that account after all. Let’s look at a couple of tips for authentication. First, check whether you can set it up on any of your accounts. Most accounts that you’d want to protect offer it. In a setup like this, the account will ask for something in addition to a password — usually, sending a text message to your phone. Second, use different types of authentication. There are different types of factors: something you know, something you have and something you are. Use factors from different families for extra protection. Third, you can use authenticator apps to easily handle two-factor authentication for multiple accounts. Fourth, check out our infographic on multi-factor authentication for more tips:>

5 Tips for National Cybersecurity Awareness Month

By |2020-10-13T11:54:41-04:00October 13th, 2020|Cyber Security Awareness, National Cyber Security Awareness Month, Uncategorized|

National Cybersecurity Awareness Month — a collaborative effort between government and organizations like ours to ensure everyone has the resources and knowledge they need to stay secure at work and at home. When it comes to cybersecurity, knowledge is power. Here are 5 tips to help keep you secure: 1. Fishing and Phishing Fishing is the art of dangling bait to catch a meal. Phishing is the art of dangling bait to catch a person. Phishers will impersonate friends, families, companies or authorities and dangle offers or threats to attract attention. Then, when someone takes that bait, the phisher harvests their information or money. Thanks to the internet, phishing is very common today. Phishers send emails to engage you, asking you to click on a link or download an attached document. Bait includes financial incentives, offers of jobs or prizes, and warnings about needing to pay a bill. The goal is to harvest money and data — or get you to download malware which will infect your system. Plain old skepticism is your best defense against phishing. Phishers want you to act quickly without questioning what they’re telling you, because their stories usually can’t hold up to closer inspection. Never download unsolicited documents or click on links in emails. 2. The Many Forms of Malware Malware comes in many forms … and many disguises. Variants include computer viruses, worms, Trojan horses, rootkits and ransomware, but it all comes down to the same thing: malicious software invading your machine. The main purpose of malware is to steal money, data, access and other valuable things. It may be either self-propagating or controlled by a remote attacker, but any form of malware attack on your system will be dangerous for you. To protect yourself from malware, always use an updated antivirus and firewall. Enable automatic updates so that your system doesn’t miss crucial patches. But you have an important role in protecting your system, too: it’s important to never carelessly download files or permit random programs to run. 3. Social Engineering — And All Its Moving Parts Sometimes, the most powerful tool is a word. Social engineers know that, and they use that tool to bypass all of the automatic protections and preplanned procedures you have in place. A persuasive lie can get an attacker further than a dozen hacking tricks. Fighting social engineering is all about being skeptical and thinking clearly. Social engineers want you to act quickly and not question what they tell you. They use tactics like sympathy, intimidation, authority and urgency, pressuring their targets to make careless decisions — such as letting them into a restricted area or turning over valuable information. When you ask questions and treat every request with healthy skepticism, you stop social engineers in their tracks. Ask them: “Can I see some ID?” Or say “I need to verify this with my supervisor.” Refuse to be taken in by a sob story or threats and insist on checking with your boss or the appropriate authorities. 4. Your Data is Valuable — Protect It Thieves coming after your money is easy to understand. But why would someone target your data? Many people don’t think of protecting data such as their email address, phone number or personal ID number. But these simple pieces of information are often valuable targets for attackers. All forms of data are valuable in one way or another: a phone number, for example, can help an attacker impersonate someone and search for more connected identity information. Protect your data and the data of others that you may handle. You can do this by never giving out information to anyone without explicit permission. Knowledge is your best defense: be aware of the different ways attackers can target your data and the various tricks that they use to convince you to hand it over. When in doubt, always double-check with your manager! 5. The Smart Way to Handle Smart Devices Smartphones, smart appliances, smart homes … Is there anything that isn’t smart? Well, it turns out that relying on smart devices isn’t always that smart. The Internet of Things, or IoT, is the new frontier in networking. Smart devices have internet capability, enabling them to network with computers, phones and each other. The purpose is to share data, making your life easier. Unfortunately, that data is not always secure. The joker in the deck is the newness of the tech. Smart devices contain computing technology, but they aren’t always created and issued by companies that specialize in computers. Many smart devices ship with little or no security protocols. IoT devices have already been implicated in several high-profile data breaches. Attackers can exploit weak cybersecurity and default passwords to break into the device. Then, once they have that access, they can leapfrog to the wider network and the other devices there. When it comes to smart devices, the smartest thing to do is keep them safe and separate. Research the device’s security settings and credentials, and make sure that you’re using new, unique, strong passwords on each device. Feel free to Contact Us for more information on Cyber Security Awareness Training.>

Three Massive Microsoft Outages Impact Businesses Just Days Apart!

By |2020-10-13T09:47:24-04:00October 13th, 2020|Business Continuity Solutions, Infrastructure Security, IT Support, Uncategorized|

A third outage in less than two weeks has cut access to Microsoft 365 cloud apps such as Microsoft Teams and Outlook, impacting businesses on October 7, 2020. At 2:48 p.m. EDT, Microsoft tweeted “We‘re investigating an issue affecting access to Microsoft 365 services. Users may see impact to Microsoft Teams, Outlook, SharePoint Online, OneDrive for Business, and Outlook.com.” An hour later, the company followed up with a second tweet, which said “We’ve identified a recent change that may have resulted in impact to multiple Microsoft 365 services. We’ve reverted the change and services are recovering.” Then, at 4:19 p.m., it tweeted “Our investigation determined that a network infrastructure change resulted in accessibility issues. Our telemetry indicates that service is recovering following the reversion.” Outages Highlight Need for SaaS Email Protection Services As noted above, this is the third, recent outage impacting Microsoft 365 users. On September 28, 2020, users of cloud-based Microsoft applications including Teams, Microsoft 365, Outlook, Exchange, Sharepoint, OneDrive, and Azure were unable to access the business-critical applications for up to five hours. A Microsoft spokesperson stated there was no reason to believe the first outage was a result of malicious activity, but the cause remains unclear. However, it’s still an indicator of an imperative need to protect cloud-based business data for businesses large and small. Many think cloud-based data will always be accessible, but that simply isn’t the case. Worse yet, contrary to popular belief, it’s not always Microsoft’s responsibility to restore lost data. That was followed by a second outage just two days later October 1, 2020. During the second outage, users were unable to access Email via Microsoft Outlook. This one was due to a Microsoft configuration change. All of these outages impact business productivity. Outages like this can put your clients at risk of data loss and costly business downtime. That’s why SaaS Email Backup is a crucial. SaaS Email Protection provides a simple, streamlined process to export Microsoft data to ensure “offline” continuity. For example, if a client needs to reference a file but can’t access Microsoft 365, you can use an exported version of the latest backup to continue productivity. Once Microsoft systems are back online, the latest version can be uploaded back into OneDrive. SaaS Email Protection can also make it easier for businesses to resume conversations they may have been having in Microsoft Teams. During an outage, we can export all public channel conversations in an easy to read format to ensure clients’ can continue remote collaboration without disruption. Learn how SaaS Email Protection can help keep your data secure and accessible during Microsoft outages in the info below:>

Don’t pass on strong passwords!

By |2020-10-13T08:35:21-04:00October 13th, 2020|Cyber Security Awareness, National Cyber Security Awareness Month, Uncategorized|

worry about password safety. Sometimes it seems like that in order to be safe, your password must contain letters, numbers, punctuation, emojis, colors and at least one Egyptian hieroglyph. But the truth is that it’s easier to create a long, strong, safe password than most people think. Let’s take a quick look at a few tips for making a password that will keep your account safe. First, try using a passphrase instead of a password. Passphrases or sentences will always be longer than a single word (which is good, because government advice now suggests that passwords be anywhere from eight to 64 letters long!) and they stick in your mind better, because they have more meaning. Second, make sure it’s something you can remember without writing down. If you do have to write down your password, make sure to protect that paper really carefully — like locking it in a desk drawer or safe. Third, check out our infographic on shaking up your passphrase protocol and pick up a few good tips on creating and protecting strong passwords:>

Don’t worry, be appy: A quick look at app safety!

By |2020-10-09T09:08:38-04:00October 9th, 2020|Cyber Security Awareness, National Cyber Security Awareness Month, Uncategorized|

almost 50% of all smartphone users download at least one new app a month. Just like with any device or program, though, it’s important to choose and use your apps carefully. Some apps may be scams or contain viruses. Here’s what you can do to keep yourself safe. First, look out for permissions. Any time you install an app, it’ll ask you to allow it permission to access functions of your device — stuff like the camera, text messaging ability and contacts list. But should a fitness app need to use your camera, or a game need to know who you call? You can click “Deny” to keep an app from getting certain permissions. Second, get your apps from the official sources. Apple App Store and Google Play have standards for what apps they include, and something from the official store is less likely to cause problems for you. Third, check out our infographic for more app safety advice:>

Title

Go to Top