<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=253481741744766&amp;ev=PageView&amp;noscript=1">

CSG Blog

“Lucky Charm” Keeps Hackers Out

Posted by Scott Spiro on Friday, 03 March 2017

Ralph’s been a good employee for you. Shows up on time. Gets the job done. Doesn’t hassle anybody.

He’s also a porn addict. When nobody’s looking, he’s visiting sites – on your network – that you’d be appalled to see IF…you knew about them. Without careful monitoring and filtering, this kind of Internet use on your network can remain hidden.

Read More

Topics: Cybercrime, Security, cybersecurity

The Small Business Cyber Security Checklist

Posted by Scott Spiro on Tuesday, 15 November 2016

In 2015, the world's first "international cybermafia" stole up to $1 billion from more than 100 global financial institutions. The gang's "spear-phishing" emails opened the bank's digital doors and released trojans into each entity, which then directed ATMs to transfer huge sums of money into dozens of hacker accounts. Although your business might not have billions in the bank, data breaches like these could happen to any entity -- regardless of size -- and implementing a cyber security checklist is the first step to securing your digital walls.

Read More

Topics: Security, Small Business, cybersecurity

4 Cybersecurity Mistakes to Avoid

Posted by Scott Spiro on Tuesday, 04 October 2016

Things were going great at Michael Daugherty’s up-and-coming $4 million medical-testing company.

Read More

Topics: Security, cybersecurity

2/3 of Fired Employees Can Access Their Former Company’s Cloud Data AFTER Leaving

Posted by Scott Spiro on Friday, 17 July 2015

Read More

Topics: Employer Employee Relationship, Security, Business

Forget Passwords: Access Your Phone By Identifying Pics of Familiar Faces

Posted by Scott Spiro on Monday, 13 July 2015

Read More

Topics: Privacy, Security, Biometrics

Tip of the Week: Use This Security Checklist to Protect Your Network

Posted by Scott Spiro on Wednesday, 01 July 2015

Read More

Topics: Tip of the week, Security, Network

Despite Technology’s Shortcomings, People Are Still the Root of Hacking Attacks

Posted by Scott Spiro on Wednesday, 01 July 2015

Read More

Topics: Hackers, Security

The Internet of Things is the Next Big Thing, Are You Ready?

Posted by Scott Spiro on Friday, 26 June 2015

Read More

Topics: cloud, Security, The Internet of Things

Where Hackers Go to Shop for Malware

Posted by Scott Spiro on Friday, 05 June 2015

Read More

Topics: Hackers, Security, Malware

Social Engineering: Not All Hackers Target Technology

Posted by Scott Spiro on Friday, 08 May 2015

Read More

Topics: Hackers, Security, Social Engineering

FREE REPORT

What Should You Expect to Pay for IT Support in Los Angeles

Need IT support but don't how much it should cost? Download our FREE report to discover what most IT service companies in Los Angeles charge, what you should expect to pay for quality IT support, and how to get exactly what you need without unnecessary extras, hidden fees and fake, lowball estimates.

Fill out the form for your FREE executive report.

Recent Posts