Need Assistance? Call us at (512) 814-8044, or submit a ticket

7 Critical Cyber Security Measures for Associations

Image of two hands attempting to grab a laptop with the words "Cyber Security" and "Password" on the screen

Your Computer Network Is Being Haunted, And Your Membership Association is Under Cyber Security Attacks.

Right now, Cyber Security attacks are being perpetrated by extremely dangerous and well-funded cyber crime rings using sophisticated techniques to hack into thousands of membership associations to steal credentials, credit cards, and other confidential business data with one goal in mind: blackmail the executives of these associations to recover data, and swindle money directly out of their organization’s bank accounts.

This new threat is called CEO Phishing, and it is a real threat. FBI also calls them “Business Email Compromise” (BEC). If you’ve recently received a bogus email supposedly from your Executive Director, Chief Financial Officer, or a member of the board asking for a bank transfer, you just got a taste of this threat.

82,000 NEW malware threats are being released every single day and HALF of the cyber security attacks occurring are aimed at small organizations just like yours. You just don’t hear about it because it’s kept quiet for fear of bad PR, lawsuits and sheer embarrassment.

The National Cyber Security Alliance reports that 1 in 5 small businesses have been victims of cyber security crime in the last year and this number is growing rapidly as businesses continue to move to cloud computing and mobile device, and to store more information online.

The worst part of this is that all the current security tools we pile onto the network are practically useless against these types of cyber security attacks because they target human beings. This is what is popularly known as social engineering attacks.

According to security experts, the most advanced antivirus software, firewall, spam filter, two-factor-authentication, intrusion detection system, secure web application firewall, and data encryption tools will not stop these types of attack.

What can you do?

(more…)

Share

Comments Off on 7 Critical Cyber Security Measures for Associations

Computer Problems? Before You Call Tech Support

This is truly the age of information at your fingertips and most users may not even be aware of the vast array of tools available on the Internet – from tutorials on paper and video to easy to use applications that can do everything, even make coffee.

Most home users or even business users without dedicated IT support usually find themselves calling technical support or local providers of support services for computer problems they can easily fix themselves if they take a minute to get online and search for answers. (more…)

Share

4 Comments

MCIBTY: My Certification Is Better Than Yours

There was a book I read called “My Mercedes Is Bigger Than Yours”  – which pretty much sums up what the book was all about: bragging rights as to whose car is “bigger”. In this case the practice, in some cultures, of using the model tag on a Mercedes -Benz car as an index of the economic and social power of its owner: for example, the Mercedes-Benz 200 designated the small rich while the Mercedes-Benz 500 SL announced the super rich. It was a typical intra-class war where your neighbor had to have a bigger and sometimes better car than the one you were driving. (more…)

Share

Comments Off on MCIBTY: My Certification Is Better Than Yours

How Perverse Incentives Drive Bad Security Decisions

An employee of Whole Foods in Ann Arbor, Michigan, was fired in 2007 for apprehending a shoplifter. More specifically, he was fired for touching a customer, even though that customer had a backpack filled with stolen groceries and was running away with them. I regularly see security decisions that, like the Whole Foods incident, seem to make absolutely no sense. However, in every case, the decisions actually make perfect sense once you understand the underlying incentives driving the decision. All security decisions are trade-offs, but the motivations behind them are…

Comments Off on How Perverse Incentives Drive Bad Security Decisions
Close Menu
Share
Share