Our partner Keeper Security has published this article on avoiding ransomware. Below, we summarize the main points and discuss how we can help you take these steps. Perform regular system backups in case data is damaged by ransomware or other disaster. We offer full...
Cyber Security
Geek Girls IT Services Blog
The latest on cyber security, computer support and small business IT from one of New Jersey and New York’s top managed IT service providers.
From Computer World: You Can’t Keep Quiet When You’re Hacked Anymore
If your business is in one of 16 critical infrastructure sectors, a new law will require that you advise the government if you've been successfully attacked. You must report hacks within 72 hours of the discovery of an incident, and 24 hours if you make a ransomware...
Lloyd’s Cybersecurity Insurance Will No Longer Pay for State-Sponsored Attacks
Insurers are becoming increasingly aware of the costs of cybersecurity claims. Expect your coverage to become increasingly limited. While cybersecurity insurance is critical to your business, it cannot and should not be the only step you take to protect your company...
Ransomware Attacks Reached All-Time High at End of 2020
From our friends at Rue Insurance: "Ransomware attacks spiked in 2020 as the chaos of COVID-19, combined with the transition to remote work, provided an abundance of opportunities for cybercriminals." Business interruption losses arising from these attacks were...

Cyber Security Insurance Alone Will Not Protect You From Hackers
Ransomware claims have increased over 300 percent in the past year. Cyber security insurance is going to become more expenses and harder to get as insurers try to protect themselves from big losses. Are you using multi factor authentication? If not, you might not be...
We Can’t Completely Protect You From Hackers: One Step Only You Can Take
Yes, you read that headline right. There is one part of the security puzzle that you must complete. We can't do it for you. Cloud VPNs, managed antivirus, firewalls, DNS protection, spam filtering, 2 Factor Authentication, password managers.... With all these tools,...
Annual Data Breach Report: Phishing, Ransomware and Malware Up From Last Year
Verizon's 2021 Data Breach Report found that hacking activity has increased in 2021. The report indicates that social engineering attacks and password hacks continue to grow in popularity among hackers. Ask us how we can help protect your employees from these...
From NCSC: The Rise of Ransomware – Company is Attacked by the Same Hackers TWICE!
This blog post from Britain’s National Cyber Security Centre discusses why, when it comes to a ransomware attack, it’s critical to treat the cause, not just the symptoms. A victim of a ransomware attack paid cyber criminals millions to restore their data. They were...
From Krebs on Security – Whistleblower: Ubiquiti Breach “Catastrophic”
When the devices you manufacture are cloud-managed, the last thing you want is for your customers’ login credentials to be breached. The second to last thing you want is to lie about the breach. As the article notes,” If you have Ubiquiti devices installed and haven’t...
Free Guide from Duo Security: How to Secure Remote Access
Our partner Duo MFA offers this guide on how to secure remote access for your users: The Essential Guide to Securing Remote Access The guide explains How the work-from-home explosion that started in early 2020 is driving the need to secure remote access Specific types...