
Network security is currently a hot topic, but it’s always been big with us. Hackers are always working to find new ways to pry their way into business networks, unfortunately. And their goals are usually nefarious. Lately we’ve heard some high profile stories involving ransoms demanded from hackers using ransomware, which will lock your files until you pay up.
We certainly have solutions and systems for keeping these bad actors out, but we also have some experience getting access back after these criminals have hacked a network. Today I’m telling a true story of a ransomware event with one of our clients. This ended costing the client a lot more than if the software we had been recommending for quite some time had been installed.
This sort of thing doesn’t just happen to big companies with super deep pockets. Often, smaller companies with older and weaker security systems in place make easier targets for these type of hacks. You likely won’t hear about them very often, because these companies don’t want their customers and prospects to know they were hacked, it would put a big dent in their trustworthiness.
Listen in and if you have any questions give us a call. We’re happy to answer any questions and give a recommendation if you think this could happen to you.
Host info
Kelly Herrod, the founder and CEO of Herrod Technology, started the company in 2000 to provide simple IT solutions for small and mid-sized businesses. His personal approach, over 30 years experience and his ability to simplify IT sets him apart in the IT industry.
Thanks for listening! Don’t forget to subscribe on Apple Podcasts, Spotify, Google, or Stitcher. (Or your favorite podcast app.) If you like what you heard, please leave a review on iTunes and share what you liked about the show.
16. Having A Great Relationship With Our Customers Is Key
I can't remember any meeting I've ever sat in with a potential client who asks us about our certifications. Most of our clients don't even know what those certifications are, or what's required to get that certification, and how it applies to them. When I was at EDS,...
15. Multifactor Authentication Could Save Your Bacon
Two-factor authentication or multifactor authentication is making a huge push over the past couple of years, but it's been around for a while. The reason it's making such a big push here lately is because Microsoft is starting to push that out to their Office 365...
14. Do Your Laptops Have Encryption Enabled? They Should!
Your phone and tablets, those are a little easier to secure in that most people either have a pass code or face ID or fingerprint identification. That's pretty secure. That's about as secure as it can get out there. You can do face ID on your laptop with Windows now,...
Related Posts
15. Multifactor Authentication Could Save Your Bacon
Two-factor authentication or multifactor authentication is making a huge push over the past couple of years, but it's been around for a while. The reason it's making such a big push here lately is because Microsoft is starting to push that out to their Office 365...
14. Do Your Laptops Have Encryption Enabled? They Should!
Your phone and tablets, those are a little easier to secure in that most people either have a pass code or face ID or fingerprint identification. That's pretty secure. That's about as secure as it can get out there. You can do face ID on your laptop with Windows now,...
13. Password Best Practices for Ultimate Security from Hackers
When it comes to passwords, there's some pretty hard and fast rules on what you should and shouldn't use as far as length of password and types of characters. What I like to tell people, and what even a lot of our business clients have started doing, is use a Password...
Subscribe for Podcast Announcements and New Episodes, Along with Information Tech and Cybersecurity Tips!
Your email is safe and secure.