GadellNet Blog

Security Update: Small Businesses and Network Monitoring

August 23, 2016

Small businesses are unique as they are usually trying very hard to balance growth opportunities while spending just enough on the essentials to stay in business. Keeping this in mind, small businesses cannot afford to avoid network security monitoring. Why is network security monitoring essential to keeping a small business in the back? Network monitoring is a system that makes sure the network is continually monitored to make sure all is well – no data breaches, no unauthorized access, [...]

Security Update: Android Users Beware

July 13, 2016

Hummer is rapidly becoming the biggest malware threat across the world targeting Andriod users. This virus has infected 1.2 million devices so far. With numbers like this, Hummer is likely the biggest Trojan family ever. Security researchers, like Cheeta Mobile Security Research Lab, have recently issued warning because this Trojan family has already made a huge impact on Android users and is continuing to grow. This Trojan takes hold by installing malware and unwanted apps to your device wit [...]

Is BYOD a Security Risk?

May 5, 2016

A year ago, GadellNet posted about Bring Your Own Device or BYOD policies. We covered the Top 10 need-to-know factors. BYOD policies have only gained in popularity. And for good reason, the benefits of BYOD policies remain – flexibility and convenience for your employees, increased efficiency and connectivity, and better mobility without investing in new devices. But there are a few drawbacks to BYOD policies as well, and the biggest one is the data security risk your company could be takin [...]

Searching for an IT Framework?

April 26, 2016

Searching for an IT Security Framework? If your company conducts business in finance, energy, or healthcare it’s easy to understand what regulatory and compliance frameworks you need to adhere to. For companies outside of these industries, specifically small and medium businesses, the understanding and awareness of an IT Security framework is more difficult to understand. Many companies spend a lot of time figuring out how to setup their IT organization to best secure their network and [...]

Cyber Liability Insurance: Is it worth the Cost?

April 22, 2016

  "Can you review this cyber insurance questionnaire?" has been the question of 2016. Some of our clients added this coverage in 2014 or 2015 and are preparing to renew or expand their policy. Others are evaluating this coverage for the first time. Even though we agree that most small and medium businesses should have a policy in place, it's important to know what you are getting, what you aren't getting, and the worrisome gaps in the middle. What is cyber insurance? Cyber insuran [...]

The GadellNet Top 10: Things Hackers are Doing Today

February 24, 2016

Security is a quickly evolving part of technology. As hackers become smarter and their tactics evolve, so must security measures to keep data safe. Recently, in the news, an L.A. hospital is cited to have paid millions of dollars in ransom money to keep hackers from distributing data they had reached. This is just one example of the way hackers’ tactics are evolving. Here are 10 more things hackers are doing today. 1. Taking advantage of Out-of-Date Programs If your software updates aren [...]

Data Audit: 5 Ways it Helps your Business

November 11, 2015

  As technology evolves, so does the way we store data and records. Being consistent in your data storage and organization isn’t always as easy as it sounds, with some companies still trying to make the transition from hard copy records to digital records. With changing records over, some inconsistencies may be detected in your data- calling for a data audit.  Although many organizations view data audits as time-consuming and not a worthwhile endeavor, the benefits outweigh the costs. [...]

The GadellNet Top 10: Cyber Security Trends for 2016

October 1, 2015

As we are on trending downhill on the year 2015, we look forward to 2016. A lot has changed in the world of cyber security in 2015 and next year the same is to be expected. We have learned a lot and anticipate seeing some of the same and some new for next year. Here is what you need to know to make sure you are prepared. 1. Internet of Things The internet of things connects objects to the internet and other devices, allowing physical objects to become part of one big information system. Th [...]

How to Protect Yourself Against a Data Breach

May 29, 2014

This week, Ebay was fortunate enough to add itself to the famed list of public corporations with a customer information security breach. Take it as a compliment, Ebay, it means you’re popular! Everyone wants a piece of you. Unfortunately, that means everybody wants a piece of you as consumers, too. On a site like Ebay, hackers can gain access to sensitive information such as your physical address, credit card information and PayPal accounts. But before you run away from the online shopping wo [...]

Are you prepared for tomorrow’s data breach?

March 12, 2014

Sure, there once was a time when being a small to medium sized business with little brand awareness had its advantages. For example, you were a lot less likely to be targeted by hackers. Often when people think of data breaches and security threats, they typically think of huge conglomerates being the focus of hackers and cyber-attacks. Take Target’s recent data breach for example, this is when credit and debit cards, along with personal data had been stolen by thieves, putting over 70 million [...]