fbpx

Firelands Computer Services Blog

Firelands Computer Services has been serving the Ohio area since 2007, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Is your business data at risk? Don’t take chances with old tech

photo-5228081

When you replace old computers or external drives, do you delete data and then just… get rid of them?

You could be putting your sensitive data at risk.

A new study by a data recovery specialist shows that millions of deleted files can be recovered from improperly wiped hard drives that are sold online

It’s not just buyers who can access your old files. Cybercriminals often buy used hard drives and attempt to recover data from them. This could include anything from confidential business information to client details.

It’s easy to forget about old data when you’re excited about shiny new technology. However, it’s important to consider what’s on that old drive before selling it or disposing of it.

Even if the drive is encrypted, it’s still possible for data to be recovered. And if the drive is damaged, there’s a chance that some of the data is still salvageable. It’s better to be safe than sorry when it comes to sensitive information.

Think about it this way: Would you leave important documents lying around for anyone to see? Of course not! Your digital information deserves the same level of protection.

So what can you do to protect yourself?

Don’t let your old hard drives become a liability. Take the time to have them properly wiped or destroyed before disposal. If you’re upgrading hardware, consider hiring a professional to handle the data transfer and ensure that your old devices are wiped clean.

This isn’t just about protecting yourself. It’s about protecting your employees, clients, and anyone else whose personal information you may have stored on that old drive.

It’s a small investment to make for the peace of mind that comes with knowing your data is safe from prying eyes.

Don’t take chances with your data – take action to protect it:

  • Properly wipe or destroy old hard drives
  • Bring in a professional for your hardware upgrades
  • Upgrade your overall security practices

Published with permission from Your Tech Updates.

0 Comments
Continue reading

If any of your staff work remotely, you need to be on top of this

USwc2022-07-18-BlogarticleLinkedInnewsletterimage

Remote and hybrid working is now normal for a lot of people.

But a recent survey has found that, despite it being more than two years since many of us were forced to work from home, too many businesses still don’t have the right cyber security measures in place for those away from the office.

The survey was originally intended to learn about spending plans from now into next year. However, the results highlighted just how few businesses have the right cyber security protections.

And it’s a worry.

Since the beginning of the pandemic, cyber security incidents – like malware, ransomware, and data breaches – have risen sharply. Cyber criminals began by taking advantage of the panic, and have since developed increasingly sophisticated tactics.

It’s costing businesses around the world billions, plus causing excessive downtime.

While the survey did show that around two thirds of businesses have good web security measures in place, like malware filters, some of the results were more disappointing.

Just 50% of companies have cloud-based cyber security systems in place right now (another 15% are exploring their options).

Cloud security gives businesses multiple layers of protection across their network and infrastructure that helps to keep data better protected against breaches or attacks.

Not only is it a good defense, but it also identifies threats before they become an issue.

The survey also highlighted that 10% of businesses plan to implement access management, which ensures only the right people can access the right systems.

A further 9% intend to prioritize VPNs (Virtual Private Networks) to allow secure network access for remote workers.

They’re also looking at zero-trust solutions where your network assumes every device or connection is a threat, until proven otherwise.

Of course, our advice is that you should already have these security solutions in place – especially if you have remote or hybrid workers.

If not, this is something to act on quickly. All you need to do is pick up the phone or send us an email. We can help.

Published with permission from Your Tech Updates.

0 Comments
Continue reading

When Securing Your Smartphone, Some Options are Better Than Others

When Securing Your Smartphone, Some Options are Better Than Others

Today’s smartphones are equipped with assorted ways that users can authenticate their identity, from the now old-fashioned PIN to basic biometrics. However, while these options are available on a wide range of phones, not all of them are equally secure. Let’s look a bit closer at these authentication measures to find out which is most effective.

0 Comments
Continue reading

Four Questions You Need to Ask Yourself About Your Data’s Security

Four Questions You Need to Ask Yourself About Your Data’s Security

Data security always needs to be considered as one of your most important business priorities. After all, the ramifications of data loss are wide-reaching and severe. To help you ensure that your data security is at the level it needs to be, we’ve put together five questions you need to answer regarding your business’ security preparedness.

0 Comments
Continue reading

Google and Apple Pushed a COVID-19 Exposure Notification Setting to Your Phone. Here is Everything You Need to Know

Google and Apple Pushed a COVID-19 Exposure Notification Setting to Your Phone. Here is Everything You Need to Know

Many users are noticing or just starting to hear about Google and Apple’s initiative to work with local governments to provide an easy way to help users prevent getting infected with COVID-19. The idea is that, if a local or state government wanted to build an app for users that would tell them if people nearby have been tested positive for COVID-19, they would get a notification on their phone. 

This, of course, raises many questions and concerns about privacy, but a lot of people are being warned that this has been forced onto their phones already, and that just simply isn’t the case. Let’s take a look.

0 Comments
Continue reading

How to Avoid the Influence of a Phishing Scam

How to Avoid the Influence of a Phishing Scam

Phishing emails are a real problem for today’s businesses, which makes it critically important that you and your team can identify them as they come in. Let’s touch on a few reliable indicators that a message isn’t a legitimate one.

0 Comments
Continue reading

You Shouldn’t Slow Your Cybersecurity Spending

You Shouldn’t Slow Your Cybersecurity Spending

COVID-19 has changed the way that most business owners look at a dollar. For months, businesses have been making strategic budget cuts to try to stay afloat. Cybersecurity has been the ultimate growth industry over the past several years, but in the face of the pandemic, the market for these products and services is seeing substantial retraction. In fact, Gartner estimates that in 2020, the cybersecurity industry will shrink by almost $7 billion. Today, we’ll take a look at the cybersecurity market and why it is important not to slow your cybersecurity spending if you can help it.

0 Comments
Continue reading

FBI Warns About Banking Scams

FBI Warns About Banking Scams

In response to the coronavirus pandemic, many people are avoiding human contact by turning to the Internet and mobile apps. On a national scope, mobile banking alone has seen an increase of 50 percent over just the last few months. In what certainly is no coincidence, the Federal Bureau of Investigation recently put out a warning that identified banking apps as likely targets for hackers.

0 Comments
Continue reading

Alert: Hackers Target Mobile Banking Apps, Warns FBI

Alert: Hackers Target Mobile Banking Apps, Warns FBI

More people than ever are utilizing the conveniences of the Internet and mobile apps to avoid unnecessary human contact during the coronavirus pandemic. In fact, mobile banking alone has increased by 50 percent over the last few months, nationwide. In a recent PSA, the FBI warned that hackers are likely to be targeting mobile banking apps.

0 Comments
Continue reading

Not All Threats are External

Not All Threats are External

As much as a business relies on its technology, it relies just as much upon its employees to properly put that technology to use. Unfortunately, this can very easily expose the business to various threats that involve their employees. Understanding these insider threats is crucial for a business, especially given how current events may tempt those who would never have considered them otherwise.

0 Comments
Continue reading

Is Your Staff Holding Up Their End on Security?

Is Your Staff Holding Up Their End on Security?

It seems as though every business is depending more and more on their IT. This means that their employees have more exposure to their IT systems. Unfortunately, that relationship is where the majority of the problems you will have are. The facts are that any business that has built a strong security policy has the solutions in place to keep direct infiltration from happening. Hackers have to find another way.

0 Comments
Continue reading

How to Avoid Becoming the Next Data Security Cautionary Tale

security_cautionary_tale

Data security isn’t a matter to be taken lightly, as too many businesses have found out the hard way. Unfortunately, there are far too many simple ways to correct common security issues - enough that it’s foolish not to do so. We’ll review a few ways to fix security issues, after discussing one of, if not the, most egregious security failings in modern history.

0 Comments
Continue reading

When it Comes to Security, Two Factors are Better Than One

step_authentication

The password isn’t nearly as secure as it used to be. Hackers have begun to take advantage of extremely powerful solutions designed to brute force their way into accounts by using software to rapidly guessing thousands of passwords per second, making it extraordinarily difficult to prepare yourself for them.

What’s the best way to guarantee that passwords aren’t going to be the downfall of your company? A great start is by taking a close look at password best practices and two-factor authentication.

0 Comments
Continue reading

Knowing, and Planning For, Your Organization’s Compliance Burden

compliance_burden

Despite what detractors say, regulations are in place for good reason. They typically protect individuals from organizational malfeasance. Many of these regulations are actual laws passed by a governing body and cover the entire spectrum of the issue, not just the data involved. The ones that have data protection regulations written into them mostly deal with the handling and protection of sensitive information. For organizations that work in industries covered by these regulations there are very visible costs that go into compliance. Today, we look at the costs incurred by these organizations as a result of these regulations, and how to ascertain how they affect your business.

0 Comments
Continue reading

Latest Blog

Browsing the web can be risky. It only takes one click on one bad link to put your business’s data at risk. With cyber criminals constantly targeting businesses using automated tools, it's important to stay one step ahead with your online s...

Contact Us

Learn more about what Firelands Computer Services
can do for your business.

Firelands Computer Services
2215 Cleveland Rd. Suite 105
Sandusky, Ohio 44870

Support Login

Sign in using ticket number and last name: