<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=253481741744766&amp;ev=PageView&amp;noscript=1">

CSG Blog

How Ransomware Works: How to Thwart Los Angeles Ransomware Attacks

Posted by Scott Spiro on Wednesday, 26 July 2017

Ransomware attacks seems to follow a similar pattern. First, HR or another targeted user receives a file as an attachment. What was disguised as a résumé quickly becomes a nightmare for IT support and snowballs into a full-out crisis. But ransomware doesn't have to compromise your business. There are ways to prevent against ransomware attacks and stay out of the spotlight.

What Is Ransomware?

Ransomware is malicious software that encrypts your files or shuts you out of your computer until you pay a fee. 

Read More

Topics: cybersecurity, Ransomware, Data Security, network security

3 Steps to a Proper Patch Management Process

Posted by Scott Spiro on Thursday, 20 July 2017

Protecting your company infrastructure against attack is top priority. But due to the complexity and time demands of IT departments, patches often get overlooked. And given the recent
WannaCrypt and Petya ransomware attacks, the need for a well-defined patch management process is more critical than ever.

Read More

Topics: managed IT services, network security

Email Management Tips by Amazon CEO Jeff Bezos

Posted by Scott Spiro on Thursday, 20 July 2017

Do you look at your inbox and want to cry? If so, you’re not alone. According to widely cited Radicati Group research, the average person gets 120 business emails every day. If you don’t manage your emails, you could end up in another statistical majority. People spend at least 14 percent of their workday on email alone. Is it any wonder that a recent Harris Poll found that only 45 percent of our workdays are spent on actual work? If you’re looking for the solution to your email woes, start with some of Silicon Valley greats.

Read More

Topics: Email, Business, Email Management Tips

6 Los Angeles Network Security Threats Your Business Must Prepare For

Posted by Scott Spiro on Monday, 26 June 2017

When you think of data security breaches, companies like Target and Yahoo probably come to mind. But now more than ever, network security threats are targeting small businesses. Still, for many small business owners, investing in the necessary network protections gets overshadowed by more immediate tasks. 

Read More

Topics: Cybercrime, Confidential Information, network security

The Dirty Loophole That Lets Insurance Companies Refuse to Cover a Cybercrime Theft in Your Business

Posted by Scott Spiro on Wednesday, 21 June 2017

As hacking hit the headlines in the last few years — most recently the global hack in May that targeted companies both large and small — insurance policies to protect businesses against damage and lawsuits have become a very lucrative business indeed. Your company may already have cyber insurance, and that’s a good thing. But that doesn’t mean that you don’t have a job to do — or that the insurance will cover you no matter what.

Read More

Topics: Cybercrime, Insurance

How To Keep Your Employees From Leaking Confidential Information

Posted by Scott Spiro on Wednesday, 31 May 2017

Back in 2014, Code Spaces was murdered. The company offered tools for source code management, but they didn’t have solid control over sensitive information — including their backups. One cyberattack later, and Code Spaces was out of business. Their killer had used some standard techniques, but the most effective was getting an unwitting Code Space employee to help — likely via a phishing attack.

Read More

Topics: Cybercrime, Confidential Information

9-Step Los Angeles Data Security Checklist

Posted by Scott Spiro on Monday, 01 May 2017

 Summer is upon us… Time for a stroll in the park...softball...fishing...a few rounds of golf… 

Yet how could you possibly relax if some random bit of malware, software glitch or cyber-attack catches you off guard just as you’re walking out the door? A well-designed secure computer network gives you the confidence that “all systems are go,” whether you’re having fun in the sun, or just getting things done with your team.

Read More

Topics: cybersecurity, Data Recovery, Data Security

Ransomware: 7 Ways To Dodge A Data Disaster

Posted by Scott Spiro on Monday, 03 April 2017

You stride into the office early one Monday morning. You grab a cup of coffee, flip on your computer and start checking e-mail…

Read More

Topics: Data, Data Recovery, Ransomware

“Lucky Charm” Keeps Hackers Out

Posted by Scott Spiro on Friday, 03 March 2017

Ralph’s been a good employee for you. Shows up on time. Gets the job done. Doesn’t hassle anybody.

He’s also a porn addict. When nobody’s looking, he’s visiting sites – on your network – that you’d be appalled to see IF…you knew about them. Without careful monitoring and filtering, this kind of Internet use on your network can remain hidden.

Read More

Topics: Cybercrime, Security, cybersecurity

Fake Apps: Newest Cybersecurity Threat

Posted by Scott Spiro on Wednesday, 01 February 2017

Ryan loved tweaking photos on his Android phone. 

He’d heard rave reviews from his friends with iPhones about Prisma, a new iOS app for image editing. So when he heard Prisma would soon be released for Android, he logged in to the Google Play Store to see if it was there yet.

Read More

Topics: cybersecurity, Mobile Security


What Should You Expect to Pay for IT Support in Los Angeles

Need IT support but don't how much it should cost? Download our FREE report to discover what most IT service companies in Los Angeles charge, what you should expect to pay for quality IT support, and how to get exactly what you need without unnecessary extras, hidden fees and fake, lowball estimates.

Fill out the form for your FREE executive report.

Recent Posts