WFM and Cybersecurity

With the COVID-19 pandemic, Work from Home (WFH) is on the rise exponentially.  With that rise, comes the possible implications of cybersecurity issues.

Yes, it’s a daunting issue to review and discuss.  But like COVID-19’s hand-washing, masks, etc., cybersecurity has several cautionary steps to instill to help protect your company, customers and employees.

Our partner via Edge Communications, Sloane Cassidy Cunningham, has developed a few quick questions to determine what the next steps you need to take to begin needed informative improvements.

  1. Do you have cybersecurity training in place for your employees?
  2. What security initiatives have you put in place of recent?
  3. Are your security initiatives focused on compliance or securing your infrastructure?
  4. Do you have any additional security goals?

Regardless if your role is training, or more involved like infrastructure protection, you can be confident Edge Communication’s security specialist Sloane Cassidy Cunningham, coupled with your Cactus Technology Solutions’ team member, can get you started with the right strides

Build or Buy? Eight Factors for Measuring TCO on Security Operations Centers

Performing a cost analysis of your security operations center (SOC) can be tricky. So, I wanted to give you a cheat sheet that outlines eight key factors for measuring your total cost of ownership. It includes average staff salaries, the biggest threats to ROI, and industry trends impacting costs. Here’s the eGuide: E-Guide – Managed Security – Build or Buy Eight Factors for Measuring TCO on Security Operations Centers – 20190507

With global SOCs located across three continents, Masergy is staffed for 24/7 continuous monitoring with full-time certified experts dedicated to incident response. Accelerate your security operations with a trusted partner that brings 19 years of threat intelligence.
When you’re ready, one of client solutions executives are ready to discuss more about your security strategy.

Are You CyberSecure?

Here are a few tips to help you and/or your organization in an effort to prevent a breach:

  •  Email Fraud
    • If it seems to good to be true, it is probably fraud.  Don’t believe the lottery awards staff or princes from a foreign country will contact you by mail.
  • Fraudulent Payments
    • Be on guard against fraudulent checks, cashier’s checks, money orders or electronic fund transfers sent with a request for you to wire back part of the money.
  • Unsolicited Offers
    • Be wary of unsolicited offers that require you to ‘ACT FAST’.
  • Stay Up-To-Date
    • Make sure your device (computer/phone) is up-to-date with the latest security updates for its respective operating system (Windows, Apple IOS, mobile phone IOS (Apple, Android, etc.).
  • Warning and Errors
    • Do not trust websites with certificate warnings or errors
  • Beware of Email Attachments
    • It’s never a good idea to click on an email attachment or free software from unknown sources; you could end up exposing your system to online fraud and theft.
  • Sharing Online
    • Watch how much your share online.  The more you post about yourself on social networking sites, the easier it may be for someone to use that information to access your accounts, steal your identity and more.  Protect your personal information by maximizing your privacy settings.
  • Financial Scams
    • Be aware of disaster-related financial scams.  Unfortunately, con artists take advantage of people after catastrophic events by claiming be from legitimate charitable organizations when, in fact, they are attempting to steal money or valuable personal information.

SOURCE:  Texas Department of Banking