About once a month, we get the call - "Something or someone has hacked our website, email, desktop, or server." The calls rarely come from regular Computing Center clients but it does happen. We are there to help and have a lot of experience in recovering and restoring and getting systems going again. This article from HP descrbes the major steps that are taken to deal with hacks. You can do-it-yourself, but as we tell our clients - we do this work all the time and isn't your time better spend doing what you do?
What do you need to do to get your site back online? Three steps to recovery.
After the initial panic subsides, your mind starts racing and you find yourself asking the question, “What do I (or my IT folks), need to do to get our site back online?” Read on for more...
What are the first few things you do when the alarm goes off on Monday morning? If you're anything like me, your morning ritual includes a bold coffee blend and a quick perusal of social media before settling down at your desk for the day.
Each day, the news regarding the Equifax breach, where upwards of 143 million account records were exposed through a flaw in a web service, keeps getting worse. On September 20th, we learned that apparently, the initial breach occurred sometime prior to March 2017 when Equifax hired an outside security company to review their systems but then, nearly four months went by before Equifax cyber-security personnel discovered it extent. And then it was nearly two months later before the general public was told about it. It will likely be months or years till the full details and extent of the breach is fully understood.
There have been many other hacks and breaches over the past several years. Many, like the Yahoo email address breach were much larger, exposing several times more user information. In the Yahoo hack, over a half billion email accounts and passwords were possibly exposed. So why is the Equifax breach far more serious? Because of the amount of personal data that’s stored by Equifax in one set of records. Nearly all important information about individuals including social security numbers, dates of birth, employment information, banking, loans, mortgages, and credit card information is right there. For the “bad-guys”, it’s a treasure trove.
by Debra J. Schmidt
More than thirty-nine percent of employees report that their bosses have asked them to do something that is dishonest or unethical, according to an opinion poll conducted by Loyalty Leader Inc.
Kevin started out in a middle management position at his company. Although this salary was modest, he worked hard and diligently supported his boss on a variety of projects as the business grew. He was promoted to a senior management position and the CEO took notice of Kevin’s dedication and excellent work. He decided to promote Kevin to assistant vice president and the two began working together very closely.
One day the phone rang in the conference room where they were meeting. Kevin answered and said, “Just a moment.” He covered the mouthpiece, then turned to the CEO and said, “It’s Kurt in accounting. He needs some information regarding the upcoming merger.
Most business owners have a general idea of the executive summary that comes with the traditional business plan. However, in the real world, summaries come up much more often than just in the business plan. How to create the summary, and how to use it, depends on the business objective.
The summary you say every day
I’ve always liked “Say your business plan every day,” which I heard first from Jim Blasingame, small business advocate. Business is normally chaotic, so a quick reminder is a good idea.