Have you reviewed who has access to your systems recently

All organizations experience change. Employees are onboarded and offboarded, technologies evolve, and external partnerships come and go. These changes affect an organization’s day-to-day activities and have repercussions on its IT system.

For instance, if your Washington-based business is expanding, you can expect not only an influx of new hires but also employees getting internal promotions.

5 Real-life phishing horror stories

Every day, cybercriminals target businesses of all sizes via phishing attacks — varying from mass-mailed scams to sophisticated targeted spear phishing schemes — and the consequences can be disastrous. In fact, IBM’s 2022 Cost of a Data Breach Report revealed that phishing is the costliest initial attack vector, at $4.91 million average cost of breach.

3 Advantages of using a password manager

Did you know that the average employee has around 200 passwords? That's a lot of passwords to remember! It's no surprise, then, that many people simply use easy-to-memorize but also easy-to-crack passwords and reuse these across multiple accounts. Some people also write down their passwords on sticky notes on their computers.

7 Common network cabling mistakes to avoid

Many businesses use network cables to connect and quickly transfer data between their computers and other devices. This means that network cabling (i.e., the infrastructure of network cables) is crucial to ensuring that employees can easily access the IT resources they need to perform their tasks.

Top tips for building a strong business continuity plan

Catastrophes may strike at any time without warning, and any firm that's caught unprepared may struggle to get back on its feet. To protect your firm from complete collapse, you need a business continuity plan (BCP).

What is a business continuity plan (BCP)?
A BCP details how a company can stay operational during an unplanned interruption caused by either a natural calamity (e.g., flash flood) or human-made disaster (e.g., ransomcloud attack). Stakeholders and key personnel create this plan in anticipation of such adverse events so that staff members, company data and systems, and physical assets are all protected.

New Year’s resolutions to improve password security

The New Year is the perfect time for business owners and managers to make resolutions that can steer the company in the right direction. Given the importance of cybersecurity in today’s business environment, they need to make the following seven resolutions to bolster password security:

1. Use long passwords
The National Institute of Standards and Technology (NIST) no longer recommends combining upper- and lowercase letters, numbers, and special characters to create a password.

Deciding whether to have an in-house IT team or a managed IT services provider (MSP) manage your business IT infrastructure can be difficult. This eBook from Fidelis will help you determine which option is best for your company.DOWNLOAD HERE