What's Happening in Tech

Assume Breach: A Growing Trend in SMB Security

October 20, 2017

Unlike the chicken and egg debate, the question of what came first is easily answered for computer viruses and antivirus products. It wasn’t the antivirus. You may remember from our antivirus post that the first virus that affected personal computers was the Elk Cloner, in 1981. The threats to computers and even other devices have […]

Developing an SMB Cybersecurity Plan, Part 7: Educating Users

October 18, 2017

The final post in our series about developing and SMB cybersecurity plan is about educating users. This isn’t a standalone phase in the NIST Cybersecurity Framework, but is included in the Recover phase. We’re breaking it out as a separate part because cybersecurity education is essential to keeping your SMB safe from bad actors online. […]

Developing an SMB Cybersecurity Plan, Part 6: Identifying Lessons Learned

October 17, 2017

“Recover” is the final part of the NIST Cybersecurity Framework. It encompasses many activities, including a review of lessons learned and ongoing training to help users respond to threats more effectively during future attacks. Today, we will look specifically at identifying lessons learned after an incident occurs. It is a fact that security incidents will […]

Developing an SMB Cybersecurity Plan, Part 5: Creating a Response Plan

October 16, 2017

Welcome to Part 5 in our Developing an SMB Cybersecurity Plan series for National Cybersecurity Awareness Month. Google “Creating a security response plan” and the number of results returned is overwhelming. It’s enough to make an SMB shy away from even attempting to create a plan that outlines how they respond to security incidents. The […]

The SMB’s Quick Guide to Endpoint Security

October 13, 2017

We’re almost to the halfway point for National Cybersecurity Awareness Month, and we’ve covered a lot of information. Next week we’ll get back to the SMB Cybersecurity Plan series, but we’ve taken a short break to dig into some of the security technologies SMBs need to be protected. Today, we’re looking at endpoint security. Endpoint […]

The SMB’s Quick Guide to Choosing the Right Antivirus

October 12, 2017

Antivirus is a part of nearly every business’s security foundation. It’s usually paired with a firewall, and for some businesses, that’s not just the foundation, it’s the whole security program. Unfortunately, not all small and medium-sized businesses use the right antivirus application, which results in the business being far more exposed than they realize. Before […]

3 Firewall Challenges That Can Leave Your SMB Unprotected

October 11, 2017

A few years ago, there was a statistic floating around the internet about how quickly hackers could find unprotected computers. That number, between 6-10 minutes, was used to scare individuals into using firewalls and other security tools. Today, the time it takes hackers to find unsecured businesses isn’t all that different. Hackers can still detect […]

Developing an SMB Cybersecurity Plan, Part 4: Safeguarding Your Business

October 10, 2017

In previous posts in this series, we’ve addressed the Identify portions of the NIST Cybersecurity Framework in blogs about layered security, inventory assessments, and cybersecurity policies. Each of those is an element of identifying what needs to be protected and how it will be protected. Now it’s time to move on to the actual tools […]

Developing an SMB Cybersecurity Plan, Part 3: Creating Cybersecurity Policies

October 9, 2017

In small and medium-sized businesses, cybersecurity is often something that’s talked about, but there are no formal, documented policies that govern how the organization and the people employed by it should behave when faced with cybersecurity threats. When an incident or a breach happens, everyone is left scratching their head or pointing fingers because they […]

Developing an SMB Cybersecurity Plan, Part 2: Inventories & Assessments

October 5, 2017

Security incidents and breaches among SMBs are on the rise. According to Thycotic’s 2017 State of Cybersecurity Metrics Annual Report, SMBs are the target in two-thirds of all cybersecurity attacks. And when attacks are successful and become incidents or breaches, SMBs are both financially impacted and can suffer irreparable reputation damage. To protect your SMB, […]

200 Oceanside Drive, Nashville, TN 37204 | Phone: 615.277.0500

©2017 Advanced Network Solutions | All Rights Reserved | Designed and Powered by SnapShot Interactive.