GadellNet Blog

General Data Protection Regulation: What you Need to Know

May 23, 2018

Who does GDPR apply to? The GDPR applies to all businesses that have: Personnel in business locations of any type (e.g., office, manufacturing plant or distribution center) in the European Union Employees, contractors, consumers, customers, patients or other people who are citizens of, located within or currently traveling through the European Union Processing that includes some type of monitoring of individuals within, or who are citizens of, the European Union Goods and/or servi [...]

Cyber Security: the Why and How for Small Business

May 1, 2018

If you’re like 71% of small business leaders, you may feel vulnerable to a cyber attack. According to a study done by Microsoft, the biggest concerns for small to mid-sized business leaders are phishing schemes, compromised passwords, ransomware, and sensitive information being leaked by an employee. With the way cyber criminals have been working, your concerns are well-placed. Both ransomware and phishing schemes have rapidly grown over the last three years. These attacks haven’t doubled or [...]

Yes, You Should Update Your Phone

April 9, 2018

It seems like every time we turn around, there’s another notification on our smartphone to run an update. It can be a hassle, it can be annoying, but it’s also necessary. Many people put off phone updates or avoid them completely, but we’re here to tell you that’s not a great idea. The number one reason you should stay on top of your phone updates is because of security. Software systems are incredibly complex and none are perfect – flaws exist. Hackers know this and they try hard d [...]

Threats Posed by Ex-Employees

February 26, 2018

No company has 100% employee retention rate. Some may get close, but in today’s business landscape, employees come and go regularly. It’s become part of the natural cycle for companies and people’s careers. Parting doesn’t mean you’re on bad terms with this person, of course. People part ways for many reasons, but even if you do part with an employee on good terms, it’s important to have your offboarding procedures finely tuned. The fact of the matter is, these ex-employees can pose [...]

Mobile Device Management and BYOD

February 14, 2018

Mobile Device Management software allows organizations to control and secure access of personal smartphones and tablets on a company’s network. What’s that mean – not just anyone can access your organization’s data on any device. Setting up a BYOD policy to work in conjunction with Mobile Device Management is the best way to ensure your data is safe. MDM When you have Mobile Device Management (MDM), you can allow mobile devices on the corporate infrastructure without any worries that t [...]

Chrome To Mark All HTTP Sites As “Not Secure”

February 13, 2018

Starting in July, news broke that Google has announced that Chrome will mark all HTTP sites as “not secure” Version 68 will notify users in the address bar. All HTTPS sites, which are encrypted, are currently marked with a green lock icon and “secure” sign. The main reason behind this change is to help users identify unencrypted and potentially threatening sites. When a site uses HTTPS encryption, the channel between a user’s browser and a user’s website is protected to ensure [...]

Edtech Security Lunch & Learn 2018

February 5, 2018

This past January, GadellNet was pleased to host a number of technology, operations, and academic leaders from schools that we know and work with for a round-table discussion about security principles that are of the most importance to schools.   Given the increasing rate of school-focused cyberattacks, schools must take steps to ... Educate their workforce and the children in their care Make policy decisions that begin to funnel the adoption of technologies through a vetting process [...]

Facing Insecurity: Addressing school cybersecurity concerns through the TLE Seal

February 2, 2018

Student data is increasingly valuable to criminals, some of whom have recently extorted thousands of dollars in ransom from US schools unwilling to see student and parent data released. Over the next couple weeks, I’ll be outlining six artifacts I hope to see in place for our schools, and their alignment to indicators of the Trusted Learning Environment Seal. For each artifact, I'll include a description of the challenges I see ahead of us and a few of the steps we’ll be taki [...]

4 Tech Trends Sweeping Small Businesses in 2018

January 12, 2018

As 2018 takes off for small businesses, the tech landscape is evolving more rapidly than ever before. If tech investment hasn’t yet been on the top of your list, 2018 will be the year you take a closer look at what tech it takes to win in your space. We have narrowed it down to the 3 tech trends that are going to be important for small businesses in 2018. Cyber Security Yes, staying secure is still at the top of our list. 71% of cyber attacks target small businesses and if those attacks are [...]

Security Notice: CPU Hardware Vulnerability

January 5, 2018

As many of you may have seen in the media yesterday or this morning, news has broken of another significant technology-related security concern - CPU architecture flaws dubbed Spectre and Meltdown. As with similar prior events, our team has been monitoring the information coming from a variety of sources, assessing the risk, and preparing next steps. What we know: Flaws in the design of modern computer processors (also called chips, or CPUs) make a wide range of hardware susceptible to several [...]