Sign Me Up For
The Free Assessment

 

Switch to  CompuShooter I.T.

It’s as easy as 1-2-3

Step 1: Analyze

Document, Monitor
Compushooter I.T. documents
and monitors your network
with our monitoring system

Step 2: Stabilize

Update, Secure
We update and secure
your systems and deploy
reliable backups

Step 3: Strategize

Plan, Propose, Upgrade
Compushooter I.T. VCTSO /
VCIO will help develop
a tech strategy for your
company strategies
  • Backups
  • Storage
  • Virtualization
  • Security
  • Training
  • Proactive Maintenance
  • Vulnerability
  • Assesment
  • Helpdesk Support
  • 21st Century Standards and Practices
  • Less Headaches, More Productivity

No matter how diligent you are about security, there’s always a chance you can get hacked. That’s why you need to put a plan in place NOW to protect yourself and your CLIENTS, so damage is minimized. But what should you do if you find out you’ve been hacked?

First, contact your IT department (us) IMMEDIATELY. The faster we can address the attack – and determine the extent of the data, applications and machines compromised – the better your chances are of preventing much bigger problems. We’ll go to work on containing the attack and conducting a full scan of your network.

Based on what we discover, we may advise you to contact the local FBI office and your attorney. Your legal responsibilities depend greatly on the type of data accessed. For example, if medical, financial or other confidential records were stolen or accessed, you are legally responsible for notifying affected individuals that their data was compromised (your attorney can best direct you on what you need to do and how to do it).

Have questions about cybersecurity or the technology at your company? I’m here to help. Book a quick, 10-minute call with me by emailing me at tumulak@compushooter.com

P.S. Did someone share this tip with you? If you want to get them direct to your inbox, please sign up by going to this link: https://www.compushooter.com/cyber-security-tip-of-the-week/

YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but if you as a manager or owner aren’t monitoring what websites your employees are visiting, what files they’re sending and receiving, and even what they’re posting in company e-mail, you could be opening yourself up to a world of hurt.

That’s because employees’ actions can subject the company they work for to monetary loss, civil lawsuits, data theft and even criminal charges if they involve disclosure of confidential company information, transmission of pornography or exposure to malicious code.

Two things you can do: One, create an Acceptable Use Policy (AUP) to outline what employees can and cannot do with work devices, e-mail, data and Internet. That way they know how to play safe. Second, implement ongoing training (like these tips!) to keep security top of mind. We can also run phishing security tests and score your employees. That will truly show if they know how to spot a suspicious e-mail, and will make them realize how easy it is to be duped.

If you need help with setting up an AUP or employee training, give us a call at 480-464-0202

Have questions about cybersecurity or the technology at your company? I’m here to help. Book a quick, 10-minute call with me by emailing me at tumulak@compushooter.com

P.S. Did someone share this tip with you? If you want to get them direct to your inbox, please sign up by going to this link: https://www.compushooter.com/cyber-security-tip-of-the-week/


  
[contact-form-7 id="5555" title="Mobile Form"]