Cyber-Insurance:How It Can Save You Long-Term

It's likely you have insurance plans for all of the unforeseen circumstances in life: apartment fires, cell phone accidents and even getting sick. You may think of these plans as no-brainers, but have you considered whether you need the same insurance for your cybersecurity? 

According to a recent study completed by IBM in 2019, it’s estimated a data breach on average can cost a business roughly 3.9 million dollars. That number is still hard to pinpoint, given that many major companies may not report breaches due to PR concerns. Costs may vary for every business, but cyber-related security breaches are affecting organizations all over the world, large and small. 

Read More

Topics: Security, IT, Managed IT Services, Cybersecurity

The Difference Between Backups and Disaster Recovery — And How To Plan For Both

As business owners, we typically prefer not to think about what would happen if we suddenly lost all of our company’s data and crucial information through a breach or accident. With client trust on the line and possible lack of compliance with regulation, there’s major potential for disaster. Ignoring this is a blind spot that puts our business, and our customers in jeopardy. While IT support can help, we still have to be mindful of planning ahead. 

If you’ve been through a personal data loss with your own computer or phone, then you know there are often ways to restore information, but that still takes time and effort. And the “disaster recovery process” only goes smoothly if you’ve completed backups.

Read More

Topics: Security, IT, Managed IT Services, Cybersecurity

Strategic IT Planning for 2020

2020 is quickly approaching and it’s already time to start strategically planning to hit next year’s IT goals. Our rule of advice is that your team should sit down and map out your technical environment for the next 18 to 24 months, and set a 3-year budget that goes hand in hand with your strategic planning. You won’t know what you’ll need to spend until you do your homework, so here’s what matters when it comes to building a successful IT plan for 2020.

Read More

Topics: Security, IT, Managed IT Services, Cybersecurity

Secure your data with these password tips

In 2018, billions of people were affected by data breaches and cyberattacks and not only did people lose money, but they also lost their security. We hear about these cyberattacks every day and it's easy to think, "Why should I protect myself if the stats are against me?"

Or are we against the stats?  52% of us use the same passwords for different online services. This means that half of us have decided we're happy to risk our financial security and personal identity, and that can be a costly mistake. It turns out, one of the easiest ways you can protect yourself from becoming just another statistic: use a password manager. At Five Nines, when a company comes to us for managed IT solutions, we consider how they can tighten up their data security. Let's talk about ways you can quickly improve your cyber-security habits so you avoid the risk and become less of a predictable target. 

Read More

Topics: Security, Cybersecurity, password, passwords

Ensuring HIPAA Compliance With A Risk Analysis

While you hear about the occasional breach of Protected Health Information (PHI) from large organizations, smaller medical offices often believe they are safe from a breach due to their size. When it comes to cybercrime, that is no longer the case. In fact, over three million patient records were compromised in 2017 across the medical industry, and small practices were breached, hacked, and ransomed just like the larger healthcare organizations. 

Read More

Topics: Security, Healthcare, HIPAA, Compliance

Why Businesses Need Multi-Factor Authentication

Typing in a simple username and password is no longer enough to protect your data in the business technology world, which is why multi-factor authentication is such an important security measure. The cybercrime industry is after our most vulnerable information, and businesses are now forced to fight back with stronger cybersecurity practices.

Read More

Topics: Security, Cybersecurity, Multi-Factor Authentication

What Makes Cylance An Impactful CyberSecurity Solution

Cybercrime is a real threat to all businesses, SMB's included. Statistics are only showing an increase in cyberattack methods, and successful attacks result in a significant loss of productivity and data. We want to show you why we stand by Cylance for Five Nines and our partners.

Read More

Topics: Security, Cybersecurity, Webinars, Cylance

What Are Botnets & What Do You Need To Know?

A new technological threat has been increasing in popularity and strength in recent years - botnets. These are not the kind of botnets that productively crawl search engines to provide you with the best search results, these botnets are malicious and have the potential to hijack your computer.

Read More

Topics: Security, Threat Landscape, Cybersecurity, Botnets

Don't Be The Next Big Catch: Register For Your .Bank Domain

 

.BANK is not just another way to change up your domain name, it's a proactive and protective measure put in place to give you peace of mind that your customers are protected. Phishing in the financial industry is all too common, as it is the #1 cyberattack and starting point of most breaches. This reason alone is why .BANK domains are so important to implement.

Read More

Topics: Security, Outsourced IT, Phishing, Cybersecurity, Financial

Spam Filtering: Why It's Important And How It Works

Once spam hits your email inbox, you become a target. When it comes to technology, humans tend to be the weakest link in most IT security situations. Attackers will constantly try to trick them, manipulating users to click on things that they shouldn't through a variety of methods. Oftentimes, these "tricks" are via email, as email platforms can target a very large number of people and is a very "budget-friendly" attack. If users happen to click the wrong thing within the spam email, bullseye, internal data then becomes exposed.

Read More

Topics: Security, Phishing, Cybersecurity, Spam Filtering