Minimum to Maximum: Small Business IT Security
Not all small businesses have the same needs when it comes to cybersecurity. Different factors, such as industry regulations or number of employees, can dictate what’s necessary for you to do. However, there are certain security strategies all small businesses must use to keep their data, their customers, their employees, and their funds safe. Where […]
Cybersecurity: Offense and Defense
You’ve heard the adage, “the best offense is a good defense.” While that may be true in many situations, effective cybersecurity requires both a robust offense and an ironclad defense. Business Network Consulting (BNC), which is an Austin IT provider, approaches cybersecurity from both directions. BNC keeps up on new measures and advancements—which are constantly […]
What is HaaS (Hacking-as-a-Service)?
Hacking has undergone quite a few changes as internet use and technology has advanced over the past two decades. The reputation of hackers has moved from lone wolf attacks to more organized targeting of big companies for massive ransoms that can cripple a company’s operations. The market for hackers to target big companies all over the world […]
Using Azure or AWS for Air Gap Protection
An off-site backup or air gap is a common practice where a company stores their data in a location other than their production space. The advantages of air gaps are that they provide better security and recovery of data in case a set of data is breached or damaged through environmental hazards or by having it ransomed by a hacker. More recently, hackers are targeting specific companies by […]
Should You Use Azure or a Third-party Option for MFA?
At this point, every company knows it should be using Multi-Factor Authentication (MFA) as a low security bar. With MFA, users need to pass two or more verification checkpoints to gain access to a system or software. Microsoft now provides built-in MFA through Azure AD. It uses security defaults or conditional access policies to require MFA […]
The Future Of Ransomware
The Future of Ransomware Attacks If you’ve been reading the news lately, you’ve probably seen a lot of articles about ransomware attacks causing major business problems—but what are they exactly, and what do they do? Are only large companies susceptible to this cybercrime, or could it happen to anybody? Ransomware is a type of malware […]
What To Know About the Recent Kaseya Hack
In July of 2021, Kaseya, a Florida based software provider that provides Remote Management Monitoring, reported ransomware attacks for its end users. The REvil ransomware group claimed responsibility for stealing/encrypting over a million users’ data. Since Kaseya is used in companies across the country, this was a lucrative attack affecting a large population, spelling a bigger payoff for the hacking group. The response by users of the […]
Pen Testing as a Cybersecurity Measure
Because hackers’ methods are evolving to use tools that are already an integral part of your system, cybercrime prevention requires more nuanced and proactive action. How do you know if your business technology system has weaknesses that are vulnerable to hacking? Penetration testing (also known as pen testing or ethical hacking) allows you to discover […]
How To Save Money On Cyber Insurance Costs
Cybersecurity attacks are increasingly in the news with smaller companies being targeted by ransomware or other attacks. They’re often left with a difficult situation to unpack, costing extra money or damaging their reputation. Cyber Insurance coverage in response has seen an increase as companies look for ways to offset the risk and cost of an attack. While BNC is not a Cyber Insurance Provider, we […]
Choosing The Right Video Conferencing System For Your Business
Since the pandemic began in 2020, businesses have been scrambling to find the best video conferencing software that also makes the most sense financially as well as having the right features. Common Problems with Some Video Conferencing Options Businesses that use propriety systems like Polycom are often constrained by the closed network systems they operate in, confining capabilities to […]