GadellNet Blog

How to Spot Fake News

July 18, 2017

Fake news is starting to run rampant through social media and the internet. Every time I scroll through Facebook, Twitter, or even Snapchat, I find fake news. Being able to distinguish between fake news and real news can be difficult. There have been times when I was sure a headline was just too crazy to be real, but it was shared by my local news station and ending up being a legitimate story. Both Google and Facebook have begun to crack down on false and misleading news but they haven’t been [...]

Two Smart Places for Law Firms to Invest in Tech

June 14, 2017

Many lawyers cringe at the idea of choosing technology platforms. Believe it or not, however, you can have personalized legal services and technology that co-exist. Beyond that, your technology can help you connect with clients in a ver personalized way, network and collaborate, and stay current on industry trends all while keeping your data secure. As long as you are investing in scalable software solutions, these are dollars that will help your firm grow. Your smaller practice competes with [...]

Cyber Liability Insurance and Human Error

June 7, 2017

As cyber threats climb in number and begin to affect large and small businesses across all industries, have you started to rethink your security and back-up strategies? If not, it might be time to do so. Small businesses are targeted by 55% of cyber attacks, so if you’re thinking it couldn’t happen to you, think again. Even with security patching, monitoring, and secure passwords, there is still a chance your small business could fall victim to one of these attacks. If your attempts to keep [...]

WannaCry Malware – The Aftermath and Beyond

May 16, 2017

IT Security is hard. It's time-consuming and costly, and after all of that, it's hard to know how protected your organization truly is. After another rough week in the industry, I wanted to reflect on the state of events and the landscape in general. Some details from the incident: WannaCry (also known as WannaCrypt, WannaCry, or WCry) was widely deployed and destructive. And yet, experts don't regard it as well-developed malware. That's scary. The attack was actually stopped by a 22 [...]

Disaster Recovery: Your Plan should be a Priority

The stories are in the news. We see them almost weekly. A simple mistake or incident leads to a data disaster. For a small business, lost data can be an overwhelming blow.  Whether caused by a natural disaster, a fire, human error, hardware malfunction, or a phishing scheme, if your data is gone, your small business simply cannot function. 40% of small businesses that experience 3 or more days of downtime fail within 35 months. Small businesses are at a greater risk for data loss. Cyber [...]

Data Breaches Cost More Than You Think

April 27, 2017

In the last couple of years, the U.S. Department of Health & Human Services’ Office for Civil Rights has become more aggressive in enforcing HIPAA regulations. Besides being catastrophic for your business and your public image, data breaches can also lead to stiff fines from the Office for Civil Rights.  Check out this article about Metro Community Provider Network’s email phishing incident, and how it led to the discovery that they had not performed proper risk assessments.  They w [...]

Email Security Best Practices

April 13, 2017

Constant email vigilance is critical to maintaining a secure workplace. Keep these tips in mind every time you check your inbox: DO NOT Open any email attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize. "Unsubscribe" - it is easier to delete the e-mail than to deal with the security risks. Never click embedded links in messages without hovering your mouse over them first to check the URL. Respond or reply to spam in anyway. Use the [...]

Time for a VPN

April 10, 2017

Last week, Congress voted to overturn FCC privacy rules that limited how Internet service providers can profit from our data.  Once President Trump signs the resolution, ISPs will be able to: Sell our browsing history Share our searches with third parties Use malicious ads to monitor all online traffic Track all non-encrypted traffic Install spyware on smartphones that can even defeat HTTPS Quincy Larson at freecodecamp.com wrote an excellent article on how this happened, a [...]

New Ransomware Steals And Deletes Your Data

March 3, 2017

For the past few years, our team and IT teams everywhere have learned to deal with ransomware epidemic. Prevention was always preferred, but when the disaster strikes, rock-solid backups made the entire event something that can be dealt with. One of the new strains of ransomware on the market is a nightmare for organizations and their data. DynA-Crypt is one of the first major ransomware strains confirmed to ex-filtrate (steal) data. It has most of the typical ransomware damages, but increas [...]

The Tipping Point

February 10, 2017

The Tipping Point Another year done, another year begun.  Is it finally time for the world to take cyber security issues seriously?  Some would say it already does, but I’m not sure I agree.  This past year, we’ve seen some of the biggest breaches in history, for the first time ever, the issue took center stage in the U.S. Presidential election, massive vulnerabilities in the Internet of Things have finally come to light, and the number of small to mid-sized businesses attacked was hig [...]