- unsuitable on Rea Radio
- episode 85: collaborate, integrate, automate: customer relationship management & profitability
- episode 84: get unstuck: breaking down the affinity bias culture in your business
- episode 83: the value of valuations: increase your practice ownership potential
- episode 82 - for a more profitable business, engage in the strategy of law
- Article Library
- 2017 Press Releases
- Newsletter Sign-Up
- Resource Centers
Episode 12: The Great Data Saver
why you should listen
On episode 12, “The Great Data Saver,” we’re joined by data and online security expert Joe Welker, CISA. Joe shines some light on new IT threats and offers some insight into data protection techniques individuals and businesses can use to prevent disasters, destruction, and the tampering of your critical information. This episode will provide you with valuable insight Joe has gleaned from his 32 years of IT experience, including the importance of using intrusion detection systems, password protection, implementing IT protocols and properly qualifying cloud providers through scrutinized security risk assessments.
Businesses Beware: Sloppy Data Security Could Cost You – As if you didn’t have enough keeping you up at night, the topic of data security continues to send collective shivers up the spines of business owners worldwide. Unfortunately, the Aug. 24, ruling by the United States Court of Appeals for the Third Circuit didn’t make matters any better (or less expensive) for businesses guilty of failing to protect their customers’ data. In fact, companies that utilize poor security practices that ultimately lead to a breach of consumer data are at risk of facing further disciplinary action and penalties.
Who Is That Email Really From? – We hear it a lot and often – be careful when clicking on the links in your email (especially if you do not know the sender.) But what if the email is from someone you know, like your boss? And what if the email appears to come from their work account? E-mail Account Compromise (EAC) is a sophisticated scam that uses legitimate email accounts that have been compromised to target unsuspecting victims, oftentimes tricking even the most tech-savvy individuals. Read on to learn more.
Malware Threat Spreads To Smart Phones – Researchers and IT security experts from ESET, a global IT security company, recently announced that they had discovered a malware application that is designed to encrypt files and change PINs on Android devices in the United States. In return, victims are demanded to pay up to the tune of $500. Only then will hackers provide users with the recover key. Read on to learn more.
Don’t ‘Terminate’ Your Business Data Security Establishing Security Policies and Procedures – A lot goes on when someone leaves a company. Sometimes you have the ability to prepare for the departure. Other times, you don’t. Amidst the flurry of activity, one thing you shouldn’t forget is data security.
Could Your Company Be Ransomware’s Next Victim? – According to the FBI, this Ransomware continues to evolve, which helps it avoid user’s virus detection software applications – even if they are current. Since April 2014, reported the FBI, there have been 992 incidents of CryptoLocker reported. These occurrences have resulted in the loss of around $18 million. Could your company be next? Read on to learn more.
Safe & Secure: How Well Does Your Business Protect Its Data? – Laptops. Smartphones. PDAs. iPads. We conduct business in a staggering number of ways, and it’s more crucial – and, unfortunately more difficult – than ever to keep electronic information secure. We asked Steve Roth, Rea’s IT director, and Mike Moran, owner of Affiliated Resources in Dublin, for tips business owners can follow to help keep their data secure.
How Much Is Your Data Worth To Criminals? – How much would you pay to regain access to your company’s network if it was compromised and held for ransom? Are you willing to shell hundreds of dollars to take your information back from a cybercriminal, or are you willing (and able) to just walk away and start anew? I wish I were asking hypothetical questions but, unfortunately, the increased popularity of Ransomware has made the risk of such an attack a very, very real possibility.
Detect, Decrease, Defend – Don’t Let Occupational Fraud Consume You – We are living in an age of technological advancement. Our offices are protected by security systems, we have measures to ensure our checks can’t be tampered with, we employ top-notch IT companies to ensure that our data and other vital information remains secure, but it appears that our efforts are futile when it comes to detecting fraud. What are we doing wrong? Is there something else we should know about occupational fraud and how to prevent it?
Passwords Are Like Underwear … – How many sites do you log in to with a username and password each day? How about apps on your smartphone or tablet? If you were to count how many accounts you have online – between personal and business logins for email, online banking, loyalty programs and social media sites – is it 10? 50? 100?
Are You PCI-Compliant? What You Need To Know About Accepting Credit Card Payments – Your customers hand over their identities to you every day. They trust you and your employees with their most sensitive information – whether those customers are buying one of your cupcakes or turning to you for their insurance or legal needs. Yes, when your customers pay you with a credit card, they are handing you much more than a piece of plastic. Do you know about – and follow – industry standards and guidelines for how you should handle credit card data?