<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.newfathom.com/blogs/tag/security/feed" rel="self" type="application/rss+xml"/><title>New Fathom IT - Blog #Security</title><description>New Fathom IT - Blog #Security</description><link>https://www.newfathom.com/blogs/tag/security</link><lastBuildDate>Wed, 08 Apr 2026 22:35:39 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Why Backups Alone Are Not a Ransomware Strategy]]></title><link>https://www.newfathom.com/blogs/post/why-backups-alone-are-not-a-ransomware-strategy</link><description><![CDATA[For years, the go-to answer to ransomware has been simple: “We have backups.” While backups are a critical part of any cybersecurity program, relying ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Hoi8RnuwTRiYXpo72KKKcQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_e5xJbGttTWiITuDYFknKbA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_91sid9rpT82gavQyYggfew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_pjkyK43l9RBOW_UrTGE4_g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_pjkyK43l9RBOW_UrTGE4_g"] .zpimage-container figure img { width: 1110px ; height: 740.00px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Images/Backups%20and%20Recovery%20-%20Feb%202-%202026-%2002_57_06%20PM.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_TvmafSb_QRuq8x8ASb5B_g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Why Backups Alone Are Not a Ransomware Strategy</span></h2></div>
<div data-element-id="elm_ZgxHIhL6TQGPY5dJet1zqQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div style="text-align:justify;">For years, the go-to answer to ransomware has been simple: “We have backups.” While backups are a critical part of any cybersecurity program, relying on them as the primary ransomware defense is a dangerous oversimplification. In today’s threat landscape, backups alone are no longer enough.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">Modern ransomware attacks are no longer smash-and-grab operations. Attackers are patient, deliberate, and strategic. Once inside a network, they often spend days or weeks performing reconnaissance—identifying critical systems, locating backup infrastructure, and escalating privileges. By the time ransomware is deployed, attackers frequently know exactly where backups live and how to disable or encrypt them first.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">From a NIST Cybersecurity Framework (CSF) perspective, this is a failure of the Protect and Detect functions. If attackers can move freely, access backup systems, and operate undetected for extended periods, the organization is already operating at a disadvantage long before encryption begins.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">Even when backups survive an attack, recovery is rarely quick or painless. Restoring large environments can take days or weeks, during which business operations may be severely disrupted. For many organizations, especially small and mid-sized businesses, extended downtime can be just as damaging as data loss itself. Missed revenue, lost customers, regulatory penalties, and reputational harm can far outweigh the cost of the ransom.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">This is where Incident Response (IR) and Disaster Recovery (DR) planning intersect. Backups support recovery, but without a defined incident response process—who makes decisions, how systems are isolated, when recovery begins—organizations often lose valuable time. In NIST terms, the Respond and Recover functions are just as critical as prevention.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">Another common misconception is that any backup is a good backup. Traditional backups that are writable, online, and accessible with standard administrative credentials are prime targets. If attackers compromise a domain admin account—and many do—those backups are often compromised right along with everything else. Without protections like immutability, offline copies, or strict access controls, backups may offer a false sense of security.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">Testing is another overlooked weakness. Many organizations assume backups will work because they always have. But backups that are never tested may be incomplete, corrupted, or unusable when they’re needed most. From a DR standpoint, an untested restore is not a plan—it’s a hope. NIST’s Recover function explicitly emphasizes the importance of validated recovery processes and continuous improvement.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">A resilient ransomware strategy focuses on survivability, not perfection. This includes layered defenses such as endpoint detection and response (EDR), least-privilege access, network segmentation, and continuous monitoring. It also requires tabletop exercises and incident response testing so teams are prepared before a real event occurs.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">Backups remain essential, but they should be treated as a last line of defense, not the first. Organizations should invest in immutable or offline backups, restrict access to backup systems, monitor for suspicious activity, and regularly test recovery procedures. Just as importantly, leadership must understand that cybersecurity resilience is a business issue—not just an IT responsibility.</div><div style="text-align:justify;"><br/></div><div style="text-align:justify;">In ransomware incidents, the question is no longer “Can we recover our data?” It’s “Can we continue operating?” Backups help—but only as part of a broader strategy aligned with NIST CSF, Incident Response, and Disaster Recovery best practices.</div></div><p></p></div>
</div><div data-element-id="elm_v5Tcpb75Ty6-wIxUUNu9BQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 03 Feb 2026 13:18:44 -0800</pubDate></item><item><title><![CDATA[Windows 10 End-of-Life: How to Stay Safe (and Why It’s Time to Move On)]]></title><link>https://www.newfathom.com/blogs/post/windows-10-end-of-life-how-to-stay-safe-and-why-it-s-time-to-move-on</link><description><![CDATA[Windows 10 support ends in 2025, but users can extend security updates temporarily. Still, upgrading to Windows 11 is strongly recommended for better security, features, and long-term support.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rEb-14TuQ9WwXnMiLqYJCA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OZGJIb_SQ8iW7GQ65kKyzQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content- " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_pWLg7hUMRJ-SrFDQwNVNag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_zS2Cii1PTL62uXzGgzIsOA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_zS2Cii1PTL62uXzGgzIsOA"] .zpimage-container figure img { width: 1110px ; height: 739.71px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/g1033ef0c302d8baad6d26a1bac745fb07755aec4c7e76f66000a1929587c76b40d29bbfe2272d47f9e4e07242c318bedbb9ab55f6170840d6c1da537f00e4ae4_1280.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_pS7EvTLjQ1OfljjKFO08HA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Windows 10 Is Going Away</h2></div>
<div data-element-id="elm_zJhn0VTIQE2mS2xSBY-9Bg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div style="text-align:justify;">Windows 10 is officially reaching its end-of-life on&nbsp;<strong>October 14, 2025</strong>, which means Microsoft will stop providing free security updates and support to most users. But if you're not ready—or able—to upgrade your system to Windows 11, you're not entirely out of luck. Microsoft is offering Extended Security Updates (ESUs) for Windows 10 users, giving them more time to transition. Here's how you can stay secure on Windows 10 a little longer—and why upgrading still makes sense.<br/></div><div style="text-align:justify;"><br/></div></div><p></p></div>
</div><div data-element-id="elm_aztFUy7cw6AtCq1-O6AfWQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Extended Security Updates: Your Options<br/></span></h2></div>
<div data-element-id="elm_41dB5uUMk7puhcvJ2uSpSA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p>Microsoft's Extended Security Updates program was originally designed for enterprise customers, but for Windows 10, it’s being made available to&nbsp;<strong>individual users</strong>&nbsp;as well.</p><p>You now have&nbsp;<strong>two main options</strong>&nbsp;if you want to stay on Windows 10 past its official support end date:</p><ul><li><p><strong>Free Updates Through Microsoft Accounts (With Strings Attached):&nbsp;</strong>Microsoft is offering&nbsp;<strong>free ESUs for some Windows 10 users</strong>, particularly those who log in with a&nbsp;<strong>Microsoft account</strong>&nbsp;and allow telemetry and cloud integration features like OneDrive, Edge, and Microsoft 365 integration. While this is a generous offer, it does come with privacy trade-offs and may not be suitable for users with more restrictive security requirements.</p></li></ul><ul><li><p><strong>Paid Updates ($30 per Year):&nbsp;</strong>For users who don’t want to enable Microsoft cloud features or who use Windows in a professional or disconnected environment, Microsoft is offering a more traditional&nbsp;<strong>paid ESU plan</strong>—starting at&nbsp;<strong>$30 per year per device</strong>. This provides peace of mind with minimal strings attached, ensuring you get critical security patches through at least&nbsp;<strong>October 2028</strong>.</p></li></ul></div>
</div><div data-element-id="elm_3-YLHscu3hx3u6XsK6quLg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Why Staying on Windows 10 Isn’t Ideal — But May Be Necessary If You’ve Delayed<br/></span></h2></div>
<div data-element-id="elm_cAemEsrQEmysYjw_7hi1Lw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-family:&quot;pt serif&quot;;font-size:16px;">Let’s be clear:&nbsp;<strong>Extended Security Updates for Windows 10 aren’t a long-term solution—they’re a safety net</strong>. If you’re still running Windows 10 in 2025, it likely means you've put off upgrading longer than you should have. Whether it's due to hardware limitations, budget constraints, or just procrastination, the reality is that&nbsp;<strong>this option exists to buy you a little more time</strong>, not to encourage you to keep using an outdated OS indefinitely.</span></p><div><h3><p><span style="font-family:&quot;pt serif&quot;;font-size:16px;">Here’s why some users might need to rely on ESUs:</span></p><div><span style="font-size:16px;"><div><ul><li><span style="font-family:&quot;pt serif&quot;;"><strong>You’re Stuck with Legacy Hardware:&nbsp;</strong>If your current PC doesn’t meet Windows 11’s hardware requirements—like TPM 2.0 or newer CPUs—you might not be able to upgrade without replacing your device. That’s understandable, but still something you’ll need to address soon.</span></li><li><span style="font-family:&quot;pt serif&quot;;"><strong>You Haven’t Budgeted for a Replacement:&nbsp;</strong>Organizations and individuals that didn’t plan ahead may find themselves scrambling to update systems or find room in the budget for new hardware.</span></li><li><span style="font-family:&quot;pt serif&quot;;"><strong>You Need More Time to Migrate Critical Software or Workflows:&nbsp;</strong>If you’re relying on legacy software or workflows that haven’t been tested on Windows 11, the ESU program gives you a short grace period to adapt.</span></li></ul></div><div><div><span style="font-family:&quot;pt serif&quot;;"><br/></span></div><div><span style="font-family:&quot;pt serif&quot;;">But make no mistake: <strong>continuing to use Windows 10—even with ESUs—is a compromise. </strong>You’re relying on limited updates, missing out on new features, and holding onto a platform that Microsoft is gradually leaving behind.</span></div></div><div><div><span style="font-family:&quot;pt serif&quot;;">This is your final warning window. Don’t use ESUs as an excuse to stay complacent—<strong>use them to plan your transition as soon as possible.</strong></span></div></div></span></div></h3></div></div>
</div><div data-element-id="elm_HQNv2BYu6V55nk33mO11uQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>But Let’s Be Honest: Windows 11 Is the Future<br/></span></h2></div>
<div data-element-id="elm__pz31VB6In-0BbaJz6XJ1A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>While ESUs buy you time,&nbsp;<strong>Windows 11</strong>&nbsp;is clearly where Microsoft is investing its resources. Here’s why making the move is ultimately the better long-term choice:</p><ul><li><p><strong>Ongoing Support and Updates:&nbsp;</strong>Windows 11 gets regular feature and security updates without added cost or complexity.</p></li><li><p><strong>Improved Security:&nbsp;</strong>Windows 11 requires modern hardware with built-in security features like TPM 2.0 and VBS (Virtualization-Based Security), which make it much more resilient to modern threats.</p></li><li><p><strong>Modern User Interface and Features:&nbsp;</strong>From better window snapping to native Android app support and AI integration with Copilot, Windows 11 is designed for productivity and future compatibility.</p></li></ul></div><p></p></div>
</div><div data-element-id="elm_4WKzdFlI2H8gQuIUCpAyPA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Final Thoughts<br/></span></h2></div>
<div data-element-id="elm_S9oqkb-ah9Sr0-bRxY8fHg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><div><div><div><div><div><p>If you're not ready to move to Windows 11 yet, Microsoft’s Extended Security Updates for Windows 10 are a valuable option—especially with the free tier now available to personal users. But ESUs are a&nbsp;<strong>short-term solution</strong>, not a permanent fix. Use the extra time wisely: assess your hardware, back up your data, and plan your move to Windows 11. The future of Windows—and your security—depends on it.</p></div></div></div></div></div></div></div><div><div><div><div style="margin-bottom:12px;"><div><div><div style="margin-right:15px;"></div></div></div></div></div></div></div></div><p></p></div>
</div><div data-element-id="elm_MMR7zkmMTtuZenzYIiXJlQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 15 Jul 2025 09:52:14 -0700</pubDate></item><item><title><![CDATA[Top Cyber Security Policies Every Organization Should Have]]></title><link>https://www.newfathom.com/blogs/post/top-cyber-security-policies-every-organization-should-have</link><description><![CDATA[In today's digital age, cybersecurity is not just a technical issue to be solved by the IT department, but a business imperative that must be solved a ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_avHthubnRSi7SPFihQ5gbA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1pQVCS6qQ7CUufYjJi3Xng" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_R9f1dOPUTseyKQeNNUXbpA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_1AO7wKkqPOwhFzIMn_Qegg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_1AO7wKkqPOwhFzIMn_Qegg"] .zpimage-container figure img { width: 500px ; height: 630.21px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/pexels-photo-7731397.jpeg" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_FPo-a8FVTDWhoaXGIb6ksA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Top Cyber Security Policies Every Organization Should Have</span></h2></div>
<div data-element-id="elm_75cJBEgUSmGU4GVv1FvHYA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:inherit;">In today's digital age, cybersecurity is not just a technical issue to be solved by the IT department, but a business imperative that must be solved and enforced at the top. Deploying and enforcing essential IT policies will help ensure your organization is ready for the real challenges likely to face an organization. Effective cybersecurity policies serve as the foundation for a secure working environment, ensuring that all employees understand their roles and responsibilities in safeguarding the organization. Below are the top cybersecurity policies every organization should have, along with explanations of their importance.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_997ZX84lfenhR5R6GpFtrA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">1. Acceptable Use Policy (AUP)&nbsp;</span></h3></div>
<div data-element-id="elm_nSdGwHek78Jn7NjSxH390A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:</span></h4></div>
<div data-element-id="elm_E7SCQ7JB70ZU2nRE63FBNQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">An Acceptable Use Policy (AUP) sets clear guidelines for employees on the appropriate use of the organization's IT resources, including computers, networks, and internet access. It helps prevent misuse that could lead to security vulnerabilities or legal issues.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_F08fWTPc8eCZ-4OgAY2Q0w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:&nbsp;</span></h4></div>
<div data-element-id="elm_I7lxADQUz0Af9Zz8SF1k2g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Permitted and Prohibited Activities:</span> The policy should clearly define what constitutes acceptable and unacceptable use of the organization's IT resources. This includes prohibiting activities such as downloading unauthorized software, accessing inappropriate websites, or using company devices for personal gain.&nbsp;</li><li><span style="font-weight:bold;">Monitoring and Enforcement:</span> Employees should be aware that their use of IT resources may be monitored to ensure compliance with the AUP, and violations can result in disciplinary action.&nbsp;</li><li><span style="color:inherit;"><span style="font-weight:bold;">Security Protocols:</span> The AUP should reinforce the importance of adhering to security protocols, such as not disabling antivirus software or bypassing firewalls.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">BYOD (Bring Your Own Device) Guidelines:</span> If the organization allows employees to use their personal devices for work, the AUP should include specific guidelines on securing these devices and accessing corporate data.&nbsp;</span></li></ul></div><div><br></div><div>An Acceptable Use Policy helps create a secure and responsible IT environment by defining what is and isn’t allowed, reducing the risk of security breaches and legal liabilities.&nbsp;</div></div></div>
</div><div data-element-id="elm_rutN8WqG4g2k8_A8pYc1yg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">2. Asset Management Policy&nbsp;</span></h3></div>
<div data-element-id="elm_DSJcE2hBCKwNvqX81JsiZA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It’s Important:</span></h4></div>
<div data-element-id="elm_R5rPR-rXzN4g-sE3wjf9ZQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">An Asset Management Policy helps organizations track and manage their IT assets, including hardware, software, and data. Proper asset management ensures that all assets are accounted for, protected, and maintained, reducing the risk of security vulnerabilities and ensuring compliance with regulations.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_iw6-csCjXWSaUQAbEuGrkA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:&nbsp;</span></h4></div>
<div data-element-id="elm_8fXAlcTM9NS9qecf165ABw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Asset Inventory: </span>The policy should require the creation and maintenance of an up-to-date inventory of all IT assets, including servers, computers, mobile devices, software licenses, and data repositories.&nbsp;</li><li><span style="color:inherit;"><span style="font-weight:bold;">Ownership and Responsibility:</span> Each asset should have an assigned owner responsible for its security, maintenance, and compliance with organizational policies.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Asset Classification: </span>Assets should be classified according to their criticality and sensitivity, with corresponding security measures applied based on their classification.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Lifecycle Management: </span>The policy should cover the entire lifecycle of an asset, from acquisition and deployment to maintenance and disposal. Secure disposal practices, such as data wiping or physical destruction, should be mandated for retiring assets.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Remote Monitoring and Management (RMM):</span> RMM tools should be deployed to monitor the health, performance, and security of all IT assets continuously. These tools enable proactive maintenance, reducing the risk of asset failures and security incidents.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Endpoint Detection and Response (EDR): </span>EDR solutions should be implemented on all endpoints to detect, investigate, and respond to potential threats in real-time. This is crucial for preventing and mitigating cyber threats at the device level.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Patch Management: </span>The policy should mandate regular patching of all software and firmware to address vulnerabilities. Automated patch management solutions should be used to ensure that updates are applied promptly across all assets, reducing the risk of exploitation.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Access Controls: </span>Implement appropriate access controls to ensure that only authorized personnel have access to specific assets, reducing the risk of unauthorized access or misuse.&nbsp;</span></li></ul></div></div></div>
</div><div data-element-id="elm_h8TiFQLSRPxSoxXOfnah2w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">3. Business Continuity Plan (BCP)&nbsp;</span></h2></div>
<div data-element-id="elm_60kYCuTuQbMNh5z-MQUvRg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:</span></h4></div>
<div data-element-id="elm_z66CH_ndSN_D8SVgYRMEng" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">No matter how robust an organization's cybersecurity defenses are, the possibility of a successful cyberattack or catastrophic event cannot be completely eliminated. A Disaster Recovery Plan (DRP) or Business Continuity Plan (BCP) ensures that the organization can quickly recover and resume operations in the event of a disaster, whether it's a cyberattack, natural disaster, or other significant disruption.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_YC7A6xmJJ2X2K7wVVufAhA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:</span></h4></div>
<div data-element-id="elm_K-pJnDaGmHNuK-O8LGFAbA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Risk Assessment:</span> The plan should begin with an assessment of the risks that could potentially disrupt the organization, including cyber threats, natural disasters, and hardware failures.&nbsp;</li><li><span style="color:inherit;"><span style="font-weight:bold;">Data Backup Procedures:</span> Regular backups of critical data should be maintained and stored securely, preferably offsite or in the cloud, to ensure data can be restored if lost.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs):</span> The plan should define the maximum acceptable downtime (RTO) and the maximum amount of data loss (RPO) the organization can tolerate.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Roles and Responsibilities: </span>Clear roles and responsibilities should be assigned to ensure that the recovery process is efficient and coordinated.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Testing and Updates:</span> The plan should be regularly tested and updated to ensure its effectiveness in a real-world scenario.&nbsp;</span></li></ul></div><div><span style="color:inherit;">A well-developed DRP or BCP minimizes downtime and data loss, ensuring that the organization can quickly recover from unexpected events and maintain business continuity.&nbsp;</span><br></div></div></div>
</div><div data-element-id="elm_esobnbA2YH3OgxfwjK7OlQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p>You can edit text on your website by double clicking on a text box on your website. Alternatively, when you select a text box a settings menu will appear. your website by double clicking on a text box on your website. Alternatively, when you select a text box</p></div>
</div><div data-element-id="elm_SOBtYUFYqX_0n-ACWmwJCQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">4. Data Retention Policy&nbsp;</span></h2></div>
<div data-element-id="elm_5f4JEwPhPmwecIlpw1gGWw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:&nbsp;</span></h4></div>
<div data-element-id="elm_B2upPZV1ZAsjQT_vbE76Mw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">A Data Retention Policy outlines how long different types of data should be kept and when they should be securely deleted. This policy is crucial for ensuring compliance with legal requirements, reducing storage costs, and minimizing the risk of data breaches involving outdated or unnecessary data.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_x_gIdczbJpZcEC-dpi5xtQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:&nbsp;</span></h4></div>
<div data-element-id="elm_xT0ovISiXtZRMqSaXBRzCA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Classification of Data:</span> Different types of data should be classified according to their importance and sensitivity. For example, financial records may need to be kept longer than marketing data.&nbsp;</li><li><span style="color:inherit;"><span style="font-weight:bold;">Retention Periods: </span>The policy should specify retention periods for each type of data, based on legal, regulatory, and business requirements.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Secure Deletion:</span> When data is no longer needed, it should be securely deleted to prevent unauthorized access. This may involve overwriting data or physically destroying storage media.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Compliance Considerations:</span> The policy should ensure that data retention practices comply with relevant laws and regulations, such as GDPR or HIPAA.&nbsp;</span><br></li><li><span style="color:inherit;"><span style="font-weight:bold;">Regular Review:</span> The policy should be regularly reviewed and updated to reflect changes in legal requirements, technology, and business needs.&nbsp;</span></li></ul><div><br></div></div><div><span style="color:inherit;">A Data Retention Policy helps organizations manage their data effectively, ensuring that they retain only what is necessary while reducing the risk of data breaches and non-compliance penalties.&nbsp;</span><br></div></div></div>
</div><div data-element-id="elm_1I4mICseX4yMKVKg0AbgGQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">5. Password Construction Policy</span></h2></div>
<div data-element-id="elm_cUXFh1qVtKGCuohtV7iPFg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:</span></h4></div>
<div data-element-id="elm_asKMIs-VKNxYD4PQ618dfw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Passwords are the first line of defense against unauthorized access to an organization's systems and data. A weak password can be easily guessed or cracked by cybercriminals, granting them access to sensitive information. A Password Construction Policy ensures that all employees create strong, complex passwords that are difficult to break.</span><br></p></div>
</div><div data-element-id="elm_FRaAtLpIugHe50k371CnFg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:</span></h4></div>
<div data-element-id="elm_JRPLEuByMryPVqtuzYY2cw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Length Requirements: </span>The policy should mandate the use long passwords. Longer is better and more important for password cracking than complexity! NIST does not recommend complexity be a requirement but recommends length as a key factor of a good password. Consider a length of 16 or more characters where possible.</li><li><span style="font-weight:bold;">Prohibition of Common Passwords:</span> To avoid the use of easily guessable passwords, the policy should disallow commonly used passwords like &quot;password123 Length &quot; or &quot;admin.&quot;</li><li><span style="font-weight:bold;">Unique Passwords:</span> Employees should not reuse passwords across different accounts or systems to minimize the potential impact of a single password breach. To do this effectively you probably need to deploy a password manager, but the reason for that is uniqueness.&nbsp;</li></ul></div><div><span style="color:inherit;">A strong Password Construction Policy ensures that all employees create robust passwords, significantly reducing the risk of unauthorized access.</span></div></div></div></div>
</div><div data-element-id="elm_rJUq2JazI-1VlTF1xwpS0g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">6. Password Protection Policy</span></h2></div>
<div data-element-id="elm_znKqlRLf17smJ_R8_HIQyw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why It's Important:</span></h4></div>
<div data-element-id="elm_YIQ4d19goHT5RTTvdhgg4A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Even the strongest password is vulnerable if it is not properly protected. A Password Protection Policy outlines how employees should handle and store their passwords to prevent unauthorized access.</span><br></p></div>
</div><div data-element-id="elm_n4T3lsevXv3DimWldyKuAA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Key Components:</span></h4></div>
<div data-element-id="elm_uwEZCUptO1798_EsnhhJNA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><ul><li><span style="font-weight:bold;">Secure Storage: </span>Employees should store passwords using a secure method, such as a password manager, rather than writing them down or saving them in an unencrypted file.</li><li><span style="font-weight:bold;">Avoiding Sharing:</span> The policy should strictly prohibit the sharing of passwords with colleagues or third parties. Each employee should have their own unique credentials.</li><li><span style="font-weight:bold;">Multi-Factor Authentication (MFA):</span> Implementing MFA adds an additional layer of security by requiring users to provide two or more verification factors, reducing the likelihood of a breach even if a password is compromised.</li><li><span style="font-weight:bold;">Suspicious Activity Reporting:</span> Employees should be trained to recognize and report any suspicious activity related to their accounts, such as unexpected login attempts or changes in settings.</li></ul></div><div>A Password Protection Policy ensures that passwords, the keys to accessing critical systems and data, are safeguarded against compromise.</div></div></div>
</div><div data-element-id="elm_11vvGafZSV6FAcdeXnB4sA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Conclusion</h2></div>
<div data-element-id="elm_9R1WNL_aTl9eH9496zLfJg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">In the face of ever-evolving cyber threats, having comprehensive cybersecurity policies is essential for protecting an organization's assets, data, and reputation. A Password Construction Policy and Password Protection Policy work hand in hand to ensure that passwords are both strong and securely managed. An Asset Management Policy ensures that all IT assets are properly tracked, managed, and secured throughout their lifecycle. A Disaster Recovery Plan or Business Continuity Plan prepares the organization for the worst-case scenario, ensuring a swift recovery. An Acceptable Use Policy establishes clear guidelines for the responsible use of IT resources, while a Data Retention Policy ensures that data is managed and disposed of securely and in compliance with legal requirements. By implementing these top cybersecurity policies, organizations can build a strong defense against cyber threats and create a secure environment for their operations.</span><br></p></div>
</div><div data-element-id="elm_jtLVi5Y_S72oNUp5rZyQdA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 04 Oct 2024 16:23:07 -0700</pubDate></item><item><title><![CDATA[Modern Data Security: Beyond Castle Walls]]></title><link>https://www.newfathom.com/blogs/post/Modern-Data-Security-Beyond-Castle-Walls</link><description><![CDATA[ In the ever-evolving landscape of data security, the analogy of fortresses and moats, reminiscent of medieva ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_45HarH1VR26wAHHuQkcFfw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sc2OKxneRN65NLgl_dFgWw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_zts8Hx1XSpiMv3bv71DYLw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_zts8Hx1XSpiMv3bv71DYLw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jBEiumojvZSo2lVaFDSGPw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"] .zpimage-container figure img { width: 500px ; height: 544.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"] .zpimage-container figure img { width:500px ; height:544.00px ; } } @media (max-width: 767px) { [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"] .zpimage-container figure img { width:500px ; height:544.00px ; } } [data-element-id="elm_jBEiumojvZSo2lVaFDSGPw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/photo-1634565055864-06ac02738f15" width="500" height="544.00" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_qPz08vIAQ5yAf4G3Pz487A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qPz08vIAQ5yAf4G3Pz487A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">In the ever-evolving landscape of data security, the analogy of fortresses and moats, reminiscent of medieval times, has been a longstanding one. Traditionally, building a strong boundary around one's castle, akin to erecting firewalls and encryption protocols around data, was deemed the pinnacle of protection. However, as technology progresses and threats become more sophisticated, this old-school method of defense is proving insufficient in the face of modern cyber threats. In this blog, we delve into the shortcomings of the castle-and-moat approach and explore how modern data security strategies have evolved to address these challenges.</p></div>
</div></div></div><div data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"] .zpimageheadingtext-container figure img { width: 200px ; height: 157.20px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"] .zpimageheadingtext-container figure img { width:200px ; height:157.20px ; } } @media (max-width: 767px) { [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"] .zpimageheadingtext-container figure img { width:200px ; height:157.20px ; } } [data-element-id="elm_7_27yKbY9Ce8RYxzbpCkTg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/photo-1552775838-b0c8d3b881fb" data-src="/images/photo-1552775838-b0c8d3b881fb" width="200" height="157.20" loading="lazy" size="small" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Perimeter-based Security: A False Sense of Safety</strong></span><br></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;"><span style="font-size:16px;">The castle-and-moat strategy relies heavily on perimeter-based security measures. Just as a medieval castle was fortified with thick walls and a surrounding moat to repel invaders, organizations would deploy firewalls and intrusion detection systems to guard their network perimeters. However, this approach operates under the assumption that threats will always come from outside the fortified boundary. In today's interconnected world, where employees access sensitive data remotely and cloud services blur the lines of traditional network perimeters, this assumption no longer holds true.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_3BLYgPttiborGTbAUnyOzw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_3BLYgPttiborGTbAUnyOzw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3 style="font-size:24px;"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Vulnerabilities Within: The Trojan Horse of Data Breaches</strong></span><br></h3></div></h3></div>
<div data-element-id="elm_7Phq7q5Lz8AyylRv9tdAcA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7Phq7q5Lz8AyylRv9tdAcA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">One of the fundamental flaws of the castle-and-moat model is its failure to address insider threats. While medieval fortresses were designed to withstand external assaults, they were often infiltrated by spies or traitors who bypassed the defenses from within. Similarly, in the realm of data security, the greatest threats often come from within an organization. Whether through malicious insiders or unwitting employees falling victim to social engineering tactics, the castle walls do little to protect against these internal vulnerabilities.</p></div>
</div></div></div><div data-element-id="elm_Z2tdMvKYbzlXDwYtsz8tWw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Z2tdMvKYbzlXDwYtsz8tWw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Dynamic Threat Landscape: Adapting to the Changing Tides</strong></span><br></h2></div>
<div data-element-id="elm_G1_7ygMvb4GWtN4c1TS3qQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_G1_7ygMvb4GWtN4c1TS3qQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">In the digital age, cyber threats are constantly evolving, rendering static defenses ineffective. A medieval castle may have stood firm against conventional siege tactics, but it would have been defenseless against modern weaponry. Likewise, relying solely on static security measures such as firewalls and antivirus software leaves organizations vulnerable to sophisticated cyberattacks like zero-day exploits and advanced persistent threats. To combat these dynamic threats, modern data security strategies emphasize continuous monitoring, threat intelligence, and adaptive defenses that can quickly respond to emerging threats.</p></div>
</div></div></div><div data-element-id="elm_yV_cfFVBUhCG24EGDZrJxQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_yV_cfFVBUhCG24EGDZrJxQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Data Accessibility vs. Fortified Isolation: Balancing Security and Usability</strong></span><br></h2></div>
<div data-element-id="elm_0tki2vy7dkTRB7_VpdN0_A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0tki2vy7dkTRB7_VpdN0_A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">Another drawback of the castle-and-moat approach is its inherent trade-off between security and usability. Just as a medieval castle's thick walls and narrow drawbridges restricted movement in and out of the fortress, strict security measures can hinder productivity and collaboration within an organization because you need to be physically inside. In today's fast-paced business environment, where agility and accessibility are paramount, rigid security protocols can impede innovation and inhibit digital transformation efforts. Modern data security aims to strike a balance between protecting sensitive information and enabling seamless access for authorized users.</p></div>
</div></div></div><div data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"] .zpimageheadingtext-container figure img { width: 500px ; height: 281.19px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"] .zpimageheadingtext-container figure img { width:500px ; height:281.19px ; } } @media (max-width: 767px) { [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"] .zpimageheadingtext-container figure img { width:500px ; height:281.19px ; } } [data-element-id="elm_NzfrqV_1kCUr3Tbc5oRhwg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/risk-management-and-mitigation-to-reduce-exposure-for-financial-investment-projects.webp" data-src="/images/risk-management-and-mitigation-to-reduce-exposure-for-financial-investment-projects.webp" width="500" height="281.19" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>The Perils of Compliance: Meeting Regulatory Standards vs. True Security</strong></span><br></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;"><span style="font-size:16px;">For many organizations, compliance with regulatory standards such as GDPR, HIPAA, and PCI DSS is a top priority. However, the castle-and-moat approach often leads to a checkbox mentality, where organizations focus on meeting minimum compliance requirements without truly addressing underlying security risks. Just as a castle's defenses could be breached despite meeting regulatory standards, compliance alone does not guarantee protection against sophisticated cyber threats. Modern data security strategies emphasize a risk-based approach, focusing on identifying and mitigating actual security vulnerabilities rather than simply checking boxes on a compliance checklist.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_wy9ncKC9LfQJrn1Uqm2d0Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_wy9ncKC9LfQJrn1Uqm2d0Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;font-family:Lato, sans-serif;"><strong>Embracing a Zero Trust Mindset: Redefining Security for the Digital Age</strong></span><br></h2></div>
<div data-element-id="elm_-JYU9WHlx1D5N4w-a60U1g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-JYU9WHlx1D5N4w-a60U1g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">In response to the limitations of the castle-and-moat model, a paradigm shift is underway in the field of data security. Known as Zero Trust Security, this approach challenges the notion of implicit trust within traditional network perimeters and adopts a &quot;never trust, always verify&quot; mindset. Zero Trust Security assumes that threats may already exist within the network and requires continuous authentication and authorization for every user and device attempting to access resources. By removing the assumption of trust and implementing granular access controls, organizations can better protect their data assets in today's dynamic threat landscape. This doesn’t have to be overly burdensome as companies have created easy biometric authentication and passwordless sign in. These strategies can also protect information at the data level wherever that data goes, whether at a coffee shop in Italy or a ski resort in Bend, whether on a sophisticated server or on a mobile phone in your pocket.&nbsp;</p></div>
</div></div></div><div data-element-id="elm_8EBeo4coCD380KmdUrloaQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8EBeo4coCD380KmdUrloaQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><strong><span style="font-size:20px;font-family:Lato, sans-serif;">Conclusion: Building Stronger Defenses for a Digital Future</span></strong></p></div></h2></div>
<div data-element-id="elm_DhmiqJCl8cgFgCUkqqx6OA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DhmiqJCl8cgFgCUkqqx6OA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><p style="text-align:justify;">While the castle-and-moat analogy served as a useful metaphor for data security in the past, it is no longer sufficient to protect against modern cyber threats. As technology evolves and the threat landscape continues to expand, organizations must adapt their security strategies accordingly. By embracing a holistic approach that goes beyond perimeter-based defenses, prioritizes insider threat detection, adapts to dynamic threats, balances security with usability, moves beyond compliance, and embraces a Zero Trust mindset, organizations can build stronger defenses for a digital future. Just as medieval fortresses evolved in response to changing warfare tactics, so too must our approach to data security evolve to meet the challenges of the 21st century.</p></div>
</div></div></div><div data-element-id="elm__evwMs0NQbGC4aIFrm9GWg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 09 May 2024 16:52:11 -0700</pubDate></item><item><title><![CDATA[Securing Your OT Network]]></title><link>https://www.newfathom.com/blogs/post/Securing-Your-OT-Network</link><description><![CDATA[<img align="left" hspace="5" src="https://www.newfathom.com/images/a-female-milk-factory-operator-with-tablet-adjusting-processing-machine-during-covid-19.webp"/>Operational technology network security. What is an OT network and what are the best practices for securing an OT network?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_0X20OiOiRgKydMYbKirMJQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_c3s4sxZuQCyQCHolW7PANQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_VTxrJFzjTKisWdiH_HUyXw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_4R4ZKTklQw2R0-rEOyy_kA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4R4ZKTklQw2R0-rEOyy_kA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Securing Your OT Network</span></h2></div>
<div data-element-id="elm_GDYgPw7KQBON3h0_Fx7Dmw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GDYgPw7KQBON3h0_Fx7Dmw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:justify;"><span style="color:inherit;">An OT network, also known as Operational Technology network, is a type of computer network used to manage and control industrial processes and physical devices in various industries such as manufacturing, energy, transportation, and utilities. OT networks are distinct from traditional Information Technology (IT) networks, which primarily deal with data processing, business applications, and general-purpose computing.</span><br></p></div>
</div><div data-element-id="elm_wRMokxjGn_N_UGeand02tg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_wRMokxjGn_N_UGeand02tg"] .zpimageheadingtext-container figure img { width: 500px ; height: 333.50px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_wRMokxjGn_N_UGeand02tg"] .zpimageheadingtext-container figure img { width:500px ; height:333.50px ; } } @media (max-width: 767px) { [data-element-id="elm_wRMokxjGn_N_UGeand02tg"] .zpimageheadingtext-container figure img { width:500px ; height:333.50px ; } } [data-element-id="elm_wRMokxjGn_N_UGeand02tg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-medium " src="/images/premium_photo-1682144509812-4734c830b486" data-src="/images/premium_photo-1682144509812-4734c830b486" width="500" height="333.50" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;">Key characteristics of OT networks include:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><ol start="1"><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Industrial Control Systems (ICS)</span>: OT networks are designed to support Industrial Control Systems, which encompass technologies like Supervisory Control and Data Acquisition (SCADA), Distributed Control Systems (DCS), and Programmable Logic Controllers (PLCs). These systems help control and monitor physical processes like manufacturing, power generation, and infrastructure management.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Real-Time Operations:</span> OT networks operate in real-time or near-real-time, ensuring that processes are controlled and monitored with minimal latency. This is essential for maintaining the safety and efficiency of industrial processes.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Specialized Protocols:</span> OT networks often use specialized communication protocols, such as Modbus, PROFIBUS, and OPC, which are optimized for industrial automation and control.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Critical Infrastructure:</span> Many OT networks are associated with critical infrastructure, making them essential for the functioning of various industries and, in some cases, public safety.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Isolation and Segmentation:</span> OT networks are typically isolated or segmented from the broader IT networks to reduce the risk of cyber threats and maintain the integrity of industrial operations.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Robustness:</span> OT network devices and components are built to withstand harsh industrial environments, including extreme temperatures, humidity, and electromagnetic interference.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Security Concerns:</span> Security in OT networks is crucial due to the potential for cyberattacks that could disrupt operations, damage equipment, or compromise safety. Protecting against these threats is a primary focus in the field of OT cybersecurity.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Legacy Systems: </span>OT networks often incorporate legacy systems and equipment, which can pose challenges in terms of compatibility, security, and maintenance.</span></li></ol></div>
<div><p><span style="font-size:12pt;">The convergence of IT and OT networks, often referred to as IT/OT convergence, is a growing trend as organizations seek to improve efficiency and gain insights from data collected from their industrial processes. However, it also introduces new challenges related to cybersecurity and interoperability between the two types of networks.</span></p></div></div></div>
</div></div></div><div data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA"] .zpimageheadingtext-container figure img { width: 509px !important ; height: 339px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA"] .zpimageheadingtext-container figure img { width:509px ; height:339px ; } } @media (max-width: 767px) { [data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA"] .zpimageheadingtext-container figure img { width:509px ; height:339px ; } } [data-element-id="elm_ViDcjY-9Q3gvb1kjRB6yuA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-medium " src="/images/a-female-milk-factory-operator-with-tablet-adjusting-processing-machine-during-covid-19.webp" data-src="/images/a-female-milk-factory-operator-with-tablet-adjusting-processing-machine-during-covid-19.webp" width="509" height="339" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;">Security Best Practices for OT Networks</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:16px;"><span style="color:inherit;">Securing an Operational Technology (OT) network is crucial to protect critical infrastructure and industrial processes from cyber threats. Here are some best practices for securing an OT network:</span></span><br></p><div style="color:inherit;"><div><span style="font-size:16px;"></span><ol start="1"><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Network Segmentation: </span>Isolate the OT network from the broader corporate network and the internet. Implement network segmentation to create separate zones for different OT systems and control access between them with “default-deny” firewall rules.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Access Control:</span> Enforce strict access controls to limit who can access and make changes to the OT network. Use strong authentication methods, like multi-factor authentication (MFA), and follow the principle of least privilege. Don’t re-use logins for OT equipment.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Patch and Update Management:</span> Regularly update and patch all software and firmware in the OT network, including industrial control systems (ICS) components and network equipment. Be cautious when applying updates and thoroughly test them in a controlled environment prior to rolling them out to a production environment.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Network Monitoring:</span> Implement continuous monitoring to detect abnormal network behavior or security incidents. Use intrusion detection and prevention systems (IDPS) and security information and event management (SIEM) solutions to analyze network traffic and log data.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Air-Gap Critical Systems:</span> For the most critical OT systems, consider physically isolating them from the network by creating a true air gap. While this may not always be practical, it provides an additional layer of security. This is especially important for legacy equipment that does not get regular security updates.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Security Policies and Procedures:</span> Develop and enforce comprehensive security policies and procedures specific to the OT environment. These should cover topics like incident response, remote access, and configuration management.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Application Whitelisting:</span> Use application whitelisting to allow only authorized software and applications to run on OT devices and systems. This prevents the execution of unapproved software.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Physical Security:</span> Secure physical access to critical OT infrastructure, such as control rooms and industrial equipment. Install security cameras, access control systems, and alarms to monitor and control entry.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Regular Backups:</span> Implement regular backups of critical data and configurations to ensure rapid recovery in case of a cyber incident or system failure. Backups should be monitored, encrypted in transit and at rest, and have an offsite copy to protect from ransomware.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Incident Response Plan: </span>Develop a well-documented incident response plan specific to OT networks. The plan should outline the steps to be taken in case of a security breach and should be tested periodically. Other incidents to include would be extended power outages and any local relevant natural disasters that could hit your area.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Vendor and Supply Chain Security:</span> Evaluate the security practices of OT equipment and software vendors. Ensure that your supply chain is secure, and that vendors provide timely security updates. Require vendors working on site to use your own managed computers for accessing the systems instead of plugging in directly with their own devices. Require vendors to provide cyber security policies for their own operations.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Regulatory Compliance: </span>Understand and comply with relevant industry standards and regulations specific to your sector, such as NIST, ISA/IEC 62443, or other applicable guidelines.</span></li><li style="margin-left:0.25in;"><span style="font-size:12pt;"><span style="font-weight:bold;">Security Assessment and Audits: </span> Regularly engage in security assessments and audits to evaluate the effectiveness of your OT security measures and identify areas for improvement.</span></li></ol></div>
<div><p><span style="font-size:12pt;">Securing an OT network is an ongoing process that requires continuous monitoring, assessment, and adaptation to evolving threats. The specific security measures you implement will depend on the unique characteristics and requirements of your OT environment. Collaboration between IT and OT teams is essential to ensure a holistic and effective security strategy.</span></p></div></div></div>
</div></div></div><div data-element-id="elm_LxuoJjpHNuyWFWJJd9JILw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LxuoJjpHNuyWFWJJd9JILw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If you need to have your OT network analyzed and secured, click on the button below to get started!</p></div>
</div><div data-element-id="elm_5NHgQeUhT2KpF3mHJMrvkw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 25 Oct 2023 14:44:49 -0700</pubDate></item><item><title><![CDATA[What can happen when you click a link?]]></title><link>https://www.newfathom.com/blogs/post/what-can-happen-when-you-click-a-link</link><description><![CDATA[Bad actor gets the indication that your email works Most links sent in an email will be unique to the email it's sent to. If you click the link the bad ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__mbvJZ70SYqBoMho7KvVIA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_pOYGXCy-SiurY7oufqy25w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_75Wrw7fxTWS4zlmYWGQcjg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_75Wrw7fxTWS4zlmYWGQcjg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"] .zpimage-container figure img { width: 507px !important ; height: 338px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"] .zpimage-container figure img { width:507px ; height:338px ; } } @media (max-width: 767px) { [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"] .zpimage-container figure img { width:507px ; height:338px ; } } [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/browsing-the-web.webp" width="507" height="338" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_cuKShAnZQ_qpsboN8ZSlqw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_cuKShAnZQ_qpsboN8ZSlqw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div>What are the things that can happen when you click a link in a malicious email?</div></div></h2></div>
<div data-element-id="elm_WTjwVccrpn8TqCAttkUlhQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_WTjwVccrpn8TqCAttkUlhQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-size:16px;">Stage 1 (Just by clicking the link)</span></div></div></h2></div>
<div data-element-id="elm_3UY5cMfmTc6kuKK2edsiQA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3UY5cMfmTc6kuKK2edsiQA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><ol><li style="text-align:left;">Bad actor gets the indication that your email works</li><ol><li style="text-align:left;">Most links sent in an email will be unique to the email it's sent to. If you click the link the bad actor will know that your email address is up and working. Also, they'll know that you are the type of person that clicks links so they'll probably send you more spam!</li></ol><li style="text-align:left;">Bad actor gets your browser &quot;fingerprint&quot;</li><ol><li style="text-align:left;">Your browser session (and every browser session being used) has a footprint based on the information that's available from your session on that website. There are over 50 different data points that your browser gives to a web page just by visiting it. This information (although some is trivial) can disclose information about you and your company. So just clicking a link is giving bad actors 50 clues about you and your company. Here's a few of the things that can be part of your fingerprint: Public IP address, browser used, operating system (e.g. Windows, Mac), browser language, time zone, extensions, and much more! You can go to <a href="https://amiunique.org/fingerprint" title="https://amiunique.org/fingerprint" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">https://amiunique.org/fingerprint</a> to see how unique your browser session is (the more unique the worse off you are, don't be snowflake!).<br></li></ol><li style="text-align:left;">Everything and anything</li><ol><li style="text-align:left;">It's also possible if your browser is not updated that bad guys could use a vulnerability in your browser to do lots more than just gather information. Here's a list of the vulnerabilities that Chrome has had: <a href="https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-15031/opec-1/Google-Chrome.html" title="Reference " target="_blank" rel="nofollow noreferrer noopener"><span style="text-decoration-line:underline;">Reference</span></a>. Some of these allow for someone to own your browser completely. But don't worry, Chrome does a great job of updating, but if you're using an outdated browser or turned off automatic updates you could be in trouble.<br></li></ol><li style="text-align:left;">Downloading a file</li><ol><li style="text-align:left;">Sometimes just clicking a link can begin the process of downloading a file onto your computer. Usually it will require you to open or run the file to do anything truly malicious, but just getting the file on your computer is a bad step!</li></ol></ol></div></div>
</div><div data-element-id="elm_HwH9TjzbDH5B1Z-vEMfVqQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HwH9TjzbDH5B1Z-vEMfVqQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-size:16px;">Stage 2 (After you click the link)</span></div></div></h2></div>
<div data-element-id="elm_vd5XvFScQvEDSqiI4O9O1w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vd5XvFScQvEDSqiI4O9O1w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><ol><li>Web page asks you to enter login credentials</li><ol><li>This is call phishing or credential harvesting. These bad actors are trying to get your login information. Usually it's an attempt to get your business email login, but it could also be for other things like your Amazon account or bank account. See Brian Krebs great blog on the value of a compromised email account here: <a href="https://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account/" title="Reference" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Reference</a>.<br></li></ol><li>Web page installs a malicious extension</li><ol><li>If a malicious extension is added the bad actor will basically own your browser and be able to read information on web pages you visit including. Many times these extensions fall into &quot;adware&quot; where they will get paid to re-direct your website to a different web page or send you pop up notifications, but they could also be more malicious.</li></ol><li>You open or run a downloaded file</li><ol><li>This could be &quot;game over&quot; on your computer. Depending on the malware this could spring board to installing viruses on your system. Sometimes these files would be an office file with macros, or perhaps just an executable or a PDF that will exploit a vulnerability in Adobe or some other application.</li><li>The reason bad actors may want to do this are many, see Brian Krebs blog on the value of a compromised PC: <span style="text-decoration-line:underline;"><a href="https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/" title="Reference." target="_blank" rel="nofollow noreferrer noopener">Reference</a></span><a href="https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/" title="Reference." target="_blank" rel="nofollow noreferrer noopener">.</a><br></li></ol></ol></div></div>
</div><div data-element-id="elm__eol7u7TS9SVZ4gjR2KDNQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 24 Aug 2023 09:44:02 -0700</pubDate></item><item><title><![CDATA[Top 5 Cyber Security Threats to Small Business]]></title><link>https://www.newfathom.com/blogs/post/Top-5-Cyber-Security-Threats-to-Small-Business</link><description><![CDATA[Top 5 Cyber Security Threats to Small Business]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_-OZw2RzHQjChcGuQsy23ZA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_UDrI0htERuCtKJv7AIW-3g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_i5KWuJOpS76-Sjn5mMs2HQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_1sSkxIp3Sn-K6R4o1VAUcg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_1sSkxIp3Sn-K6R4o1VAUcg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1 style="margin-bottom:15px;font-size:28px;">Top 5 Cyber Security Threats to Small Business</h1></div></h2></div>
<div data-element-id="elm_HgBnDV5nQcmu7_OBz_fKDQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HgBnDV5nQcmu7_OBz_fKDQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:left;">Small businesses are becoming increasingly vulnerable to cyber attacks as more and more business operations are conducted while connected to the internet. Small businesses are often an attractive target for cyber criminals because they typically have weaker security measures than larger organizations, making them easier to breach. In this blog, we will discuss the top 5 cyber security threats small businesses face.</p><ol><li style="text-align:left;">Phishing Attacks</li></ol><p style="text-align:left;">Phishing attacks are a common threat to small businesses. These attacks are designed to trick individuals into giving away sensitive information, such as passwords and credit card numbers. Phishing attacks often come in the form of emails that appear to be from a trusted source, such as a bank or a well-known business. Once the recipient clicks on a link or downloads an attachment, malware is downloaded onto their computer, which in turn could be used to distribute false emails from their account, or deploy ransomware onto their computer or network.</p><ol start="2"><li style="text-align:left;">Ransomware</li></ol><p style="text-align:left;">Ransomware is a type of malware that extract or encrypts a victim's files and demands a ransom in exchange for the decryption key or not posting their data online. Small businesses are often targeted by ransomware because they typically have weaker security measures than larger organizations. If a small business does not have a robust backup system in place, they may be forced to pay the ransom to regain access to their files.</p><ol start="3"><li style="text-align:left;">Password Attacks</li></ol><p style="text-align:left;">Password attacks are a common method used by cyber criminals to gain access to small business accounts. Password attacks can take many forms, such as brute force attacks, dictionary attacks, and social engineering attacks. Small businesses are often vulnerable to password attacks because they tend to use weak passwords and reuse them across multiple accounts, or they have have kept default passwords in place.</p><ol start="4"><li style="text-align:left;">Malware</li></ol><p style="text-align:left;">Malware is a broad term used to describe any software that is designed to harm a computer system or network. Malware can take many forms, such as viruses, trojans, and worms. Small businesses are often targeted by malware because they typically have weaker security measures than larger organizations.&nbsp;</p><ol start="5"><li style="text-align:left;">Insider Threats</li></ol><p style="text-align:left;">Insider threats are a growing concern for small businesses. Insider threats refer to threats that come from within an organization, such as employees, contractors, or vendors. Insider threats can take many forms, such as theft of intellectual property, data breaches, and sabotage. Small businesses are often vulnerable to insider threats because they may not have the resources to conduct thorough background checks or monitor employee behavior.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Conclusion</p><p style="text-align:left;">In conclusion, small businesses face a range of cyber security threats that can lead to data theft, financial loss, and reputational damage. By implementing strong security measures, such as multi-factor authentication, regular software updates, and employee training, small businesses can reduce their risk of cyber attacks. It is important for small businesses to understand the threats they face and take proactive steps to protect themselves.</p></div></div>
</div><div data-element-id="elm_njzokvqvSgChYxKHTkKC_Q" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 03 Apr 2023 16:05:14 -0700</pubDate></item><item><title><![CDATA[Why Should You Use MFA]]></title><link>https://www.newfathom.com/blogs/post/Why-Should-You-Use-MFA</link><description><![CDATA[<img align="left" hspace="5" src="https://www.newfathom.com/Blog Images/MFA-99.9.png"/>Enabling MFA may be the single most important thing you can do to protect against cyber attacks.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_-CV5Gd6fSYWDuztBx3I1_Q" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_nR7lqfJDMTp2TEE6xCoK8A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_nR7lqfJDMTp2TEE6xCoK8A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_x0wc39-0AuprNmYhpEUS5A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_x0wc39-0AuprNmYhpEUS5A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_fyQE32nE7-ZYNQzP-pXyrw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_fyQE32nE7-ZYNQzP-pXyrw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1565849904461-04a58ad377e0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDEwfHxwaG9uZXxlbnwwfHx8fDE2MTcyMjQzNjI&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div><div data-element-id="elm_AQdYGd2xS60DRqQlnbQxJg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_AQdYGd2xS60DRqQlnbQxJg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ws94SGhnTxOgYwZdJ-A1sw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ws94SGhnTxOgYwZdJ-A1sw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">What is MFA</h2></div>
<div data-element-id="elm_1youaDA_SJa_p3nLYiiCcw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1youaDA_SJa_p3nLYiiCcw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>MFA stands for multi-factor authentication and basically means that you are using two different types of authentication to log into your account. There are three primary types of authentication factors:</p></div>
</div><div data-element-id="elm_Y0I6b7Klg-Xid6cRj1wgbw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Y0I6b7Klg-Xid6cRj1wgbw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xC1eez9SB0J5ACTDahXXHA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xC1eez9SB0J5ACTDahXXHA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_TdlLLNkZ0jOwduxz1SwjCw" data-element-type="iconHeading" class="zpelement zpelem-iconheading "><style type="text/css"> [data-element-id="elm_TdlLLNkZ0jOwduxz1SwjCw"].zpelem-iconheading{ border-radius:1px; } </style><div class="zpicon-container zpicon-align-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 2304 1792" height="2304" width="1792" xmlns="http://www.w3.org/2000/svg"><path d="M1774 836l18 316q4 69-82 128t-235 93.5-323 34.5-323-34.5-235-93.5-82-128l18-316 574 181q22 7 48 7t48-7zm530-324q0 23-22 31L1162 895q-4 1-10 1t-10-1L490 689q-43 34-71 111.5T385 979q63 36 63 109 0 69-58 107l58 433q2 14-8 25-9 11-24 11H224q-15 0-24-11-10-11-8-25l58-433q-58-38-58-107 0-73 65-111 11-207 98-330L22 543q-22-8-22-31t22-31l1120-352q4-1 10-1t10 1l1120 352q22 8 22 31z"></path></svg></span><h4 class="zpicon-heading " data-editor="true">Knowledge Factor<br></h4></div>
</div><div data-element-id="elm_DPnbKHi3gdsf46cckfANqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DPnbKHi3gdsf46cckfANqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;">Something only you know (e.g. password).</p></div>
</div></div><div data-element-id="elm_tQf4nvsbTeAJyohObTpS7w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_tQf4nvsbTeAJyohObTpS7w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6CqB2fIlot5MuI-3MHKspw" data-element-type="iconHeading" class="zpelement zpelem-iconheading "><style type="text/css"> [data-element-id="elm_6CqB2fIlot5MuI-3MHKspw"].zpelem-iconheading{ border-radius:1px; } </style><div class="zpicon-container zpicon-align-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 1792 1792" height="1792" width="1792" xmlns="http://www.w3.org/2000/svg"><path d="M640 256h512V128H640v128zm1152 640v480q0 66-47 113t-113 47H160q-66 0-113-47T0 1376V896h672v160q0 26 19 45t45 19h320q26 0 45-19t19-45V896h672zm-768 0v128H768V896h256zm768-480v384H0V416q0-66 47-113t113-47h352V96q0-40 28-68t68-28h576q40 0 68 28t28 68v160h352q66 0 113 47t47 113z"></path></svg></span><h4 class="zpicon-heading " data-editor="true">Possession Factor<br></h4></div>
</div><div data-element-id="elm_upBcG822ocASdaiaZgEm2Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_upBcG822ocASdaiaZgEm2Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;">Something only you have (e.g. mobile phone w/ MFA app).</p></div>
</div></div><div data-element-id="elm_vLXOZoNNnPebY58_6Gharw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vLXOZoNNnPebY58_6Gharw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DUJEc7CGtgz9qD8Yblryaw" data-element-type="iconHeading" class="zpelement zpelem-iconheading "><style type="text/css"> [data-element-id="elm_DUJEc7CGtgz9qD8Yblryaw"].zpelem-iconheading{ border-radius:1px; } </style><div class="zpicon-container zpicon-align-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 513.5" height="512" width="513.5" xmlns="http://www.w3.org/2000/svg"><path d="M256 64c105.85 0 192 86.15 192 192s-86.15 192-192 192S64 361.85 64 256 150.15 64 256 64zm0 32c-88.555 0-160 71.445-160 160s71.445 160 160 160 160-71.445 160-160S344.555 96 256 96zm-72 96c13.255 0 24 10.745 24 24s-10.745 24-24 24-24-10.745-24-24 10.745-24 24-24zm144 0c13.255 0 24 10.745 24 24s-10.745 24-24 24-24-10.745-24-24 10.745-24 24-24zM173 304c16.62 28.683 47.385 48 83 48s66.38-19.317 83-48l27.5 16c-22.133 38.197-63.267 64-110.5 64s-88.367-25.803-110.5-64z"></path></svg></span><h4 class="zpicon-heading " data-editor="true">Inference Factor<br></h4></div>
</div><div data-element-id="elm_jOB7kpOm0p-Hg5By1Fwx8Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jOB7kpOm0p-Hg5By1Fwx8Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;">Something only you are (e.g. biometrics).</p></div>
</div></div></div><div data-element-id="elm_7id4AaUcS3agvQS0K-ZUvg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_7id4AaUcS3agvQS0K-ZUvg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact" title="Contact Us"><span class="zpbutton-content">Find Out More</span></a></div>
</div></div></div><div data-element-id="elm_OSOZ7Mk9tQVLVK8FxlAvVg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_OSOZ7Mk9tQVLVK8FxlAvVg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_2ztXwmCSMT49TKSaT0UtUg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_2ztXwmCSMT49TKSaT0UtUg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_nMUG90LS4S0pAqYteKuUHQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_nMUG90LS4S0pAqYteKuUHQ"] div.zpspacer { height:63px; } @media (max-width: 768px) { div[data-element-id="elm_nMUG90LS4S0pAqYteKuUHQ"] div.zpspacer { height:calc(63px / 3); } } </style><div class="zpspacer " data-height="63"></div>
</div><div data-element-id="elm_y3WjUUPWnQahZom5XeB8jw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_y3WjUUPWnQahZom5XeB8jw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_TDiklZInIj5Sj-5u8u6h9w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_TDiklZInIj5Sj-5u8u6h9w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XakiXrXNS3uJFT9ELCqM-w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_XakiXrXNS3uJFT9ELCqM-w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Why Should You Use It</h2></div>
<div data-element-id="elm_eBGKaHTbQ2wqErDFC8LXcA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eBGKaHTbQ2wqErDFC8LXcA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="color:inherit;">Enabling MFA may be the single most important thing you can do to protect against cyber attacks.</span><br></p></div>
</div><div data-element-id="elm_Oh1PH4ItUaT1QGkIVJFGEw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Oh1PH4ItUaT1QGkIVJFGEw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact" title="Contact Us"><span class="zpbutton-content">Find Out More</span></a></div>
</div></div><div data-element-id="elm_fm-IJMyECUMJ10tLjXrf_A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_fm-IJMyECUMJ10tLjXrf_A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mOt0X5XdpkUgf9EcFctJlA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_mOt0X5XdpkUgf9EcFctJlA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.microsoft.com/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/" target="_blank" rel="nofollow noreferrer noopener"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Images/MFA-99.9.png" size="original"/></picture></a></figure></div>
</div><div data-element-id="elm_KoLNAehIsKMKPGw1Ux8hsA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KoLNAehIsKMKPGw1Ux8hsA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="color:inherit;"><a href="https://www.microsoft.com/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/" rel="">Microsoft found that 99.9% of account breaches happened to accounts without MFA enabled.</a></span><br></p></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 31 Mar 2021 14:19:44 -0700</pubDate></item><item><title><![CDATA[Manage Your Tech, Free Your Time]]></title><link>https://www.newfathom.com/blogs/post/why-managed-services</link><description><![CDATA[<img align="left" hspace="5" src="https://www.newfathom.com/files/alexander-andrews-X62F1WQhuLI-unsplash.jpg"/>Do you enjoy putting out fires in your business? I sure don't. What if there was a way to focus on what matters most and not live crisis to crisis?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_F7Sw11EHxHqBp9piGEEJPA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_F7Sw11EHxHqBp9piGEEJPA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ifSY8x24GBQ6S1yWetKySg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_ifSY8x24GBQ6S1yWetKySg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_AkC9qN-zmjGBTgjXHb6CcQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_AkC9qN-zmjGBTgjXHb6CcQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_moUMGpFGQWi6qbGDzvw7vQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_moUMGpFGQWi6qbGDzvw7vQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-left " data-editor="true">How Can I Free My Time?</h2></div>
<div data-element-id="elm_-bxm6SClikmAQf0fzkOp9A" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_-bxm6SClikmAQf0fzkOp9A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ZiBnjUcu849Qzy7byIWNvw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_KIbwqNcB7WZOpjO-9pevVw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_KIbwqNcB7WZOpjO-9pevVw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/30743916_10101028714995199_1273909852866871296_n.jpg" size="fit" style="height:316.75px;width:253px;"/></picture></span></figure></div>
</div></div><div data-element-id="elm_hEBBALKeDP2KQPD3QTk17Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_hEBBALKeDP2KQPD3QTk17Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_x5sFgt_WQNuK02ksR7nAVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_x5sFgt_WQNuK02ksR7nAVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Do you enjoy putting out fires in your business? I sure don't. It's the worst when my network goes down, my computer freezes, or that program simply doesn't do what it is supposed to do. What if there was a way to focus on what matters most and not live crisis to crisis?</p><p><br></p><p>You purchase internet, that special program that allows you to conduct business, and hopefully antivirus for your computers. Is that enough? Well, you don't purchase a car and just run it till it breaks down. You change the oil and perform preventative maintenance. Unfortunately, it&nbsp;doesn't stop at the computer purchase or initial network setup. You need to make sure you are doing the preventative maintenance to keep it working. This is where m<span style="color:inherit;">anaged services come in to free up your time. They allow you to proactively manage your tech to keep it working in tip-top shape.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_wlIckj8fAk9SJAQdErDdoA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_wlIckj8fAk9SJAQdErDdoA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_b0wyM5gctcXzeHBJAoKYAA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_b0wyM5gctcXzeHBJAoKYAA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_VCuaaP7dcDZ_w4xoUdAXFA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VCuaaP7dcDZ_w4xoUdAXFA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Here are a few of the things that managed services can do for you:</p><ul><li>Keep your&nbsp;<span style="font-weight:bold;">computers up-to-date,</span>&nbsp;such as the following:</li><ul><li>Operating system (OS)</li><li>Antivirus and device security</li><li>Software and drivers</li><li>Firmware and BIOS</li></ul><li>Keep your&nbsp;<span style="font-weight:bold;">network up-to-date</span></li><li>Monitor&nbsp;<span style="font-weight:bold;">network performance</span>&nbsp;and&nbsp;<span style="font-weight:bold;">internet connectivity</span></li><li>Manage&nbsp;<span style="font-weight:bold;">assets and their warranties</span></li><li>Provide remote access for&nbsp;<span style="font-weight:bold;">rapid support and recovery</span>&nbsp;when things inevitably do go wrong</li><li><span style="font-weight:bold;">Guarantee support response times</span>&nbsp;so you are back up and running as quickly as possible in the event something does go wrong</li></ul><p><span style="color:inherit;"></span></p><p><span><br></span></p><p><span style="color:inherit;">As an alternative to managed services, you could try hiring an IT person at an on-demand or break-fix capacity. However, you might not find it worthwhile if you're constantly stuck in crisis mode or you have employees being paid to just sit there? Your time is valuable. It only takes one catastrophe - that could have been avoided by a little preventative maintenance - to payback the cost of years of managed services.&nbsp;</span><span style="color:inherit;">In the same way you don't run your car into the ground, you don't want to run your tech into the ground. If nothing else, your tech gets you from point A to B.</span><span><br></span></p><p><span><br></span></p><p><span>You could also try the DIY approach to IT. If your business is very small and you're fairly tech savvy, then you might be able to handle your tech needs. However, if you're running a business larger than one or two people, the indirect costs associated with downtime and inefficiencies can quickly make it not worth the effort. More of your time means more opportunities to grow your business and more of doing what matters most to you.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_rZD5t_QQTi6Cmuwif2CKJQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_rZD5t_QQTi6Cmuwif2CKJQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_rk38GlULSa2kV4bOC69DjA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_rk38GlULSa2kV4bOC69DjA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_1_ps-UToSFuTpeMFPzqGyQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_SXMpnlYBE7WL2mCnyFUsig" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_SXMpnlYBE7WL2mCnyFUsig"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Hcx0_V0ejr_K9gOZkfLEnA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_PjzFbbowyTH5Cu4wNR5yiw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PjzFbbowyTH5Cu4wNR5yiw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-type3 zpheading-align-left " data-editor="true">&quot;Tech is like a car that needs preventative maintenance.&quot;</h2></div>
</div><div data-element-id="elm_J_YqvBHK93OvFVWzwa6R9A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_8OFgw6VfpynQtm5BaQFZmA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_8OFgw6VfpynQtm5BaQFZmA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/kenny-luo-1286691-unsplash.jpg" size="fit"/></picture></span></figure></div>
</div></div></div></div></div></div></div><div data-element-id="elm_a7SLWq99Q4_6I2la1b7Cjw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_a7SLWq99Q4_6I2la1b7Cjw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iQ7jIZb5Ne8UCS4iVptlxg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_iQ7jIZb5Ne8UCS4iVptlxg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_XW2eLhf0vgg0sxy_6CSDuQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XW2eLhf0vgg0sxy_6CSDuQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_3YCEcUSImhlVPtg_q6VCnA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_3YCEcUSImhlVPtg_q6VCnA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Why Managed Services?</h2></div>
<div data-element-id="elm_6vbe1h2vxIofbikcWlM7UQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6vbe1h2vxIofbikcWlM7UQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Do you hire a mechanic to change the oil, belts, seals, filters, etc. in your car? If so, you probably do it because its not worth your time to learn or purchase the tools to keep your car running. It's the same with IT. The tech in your business is like a car that will break down if you don't perform preventative maintenance. You could spend your valuable time learning how to do it yourself or hire the pros to help.</p><p><br></p><p>Additionally, the world is full of dirt, gravel, and other debris that are waiting for their chance to get into your car and wreck havoc. The world is also full of bots and cyber criminals that are trying to get into your tech. Without the proper proactive actions and protections you are a sitting target. Don't worry. Managed services greatly help to improve your cyber security posture. They ensure your systems are up-to-date and protected with antivirus and other critical safeguards.</p></div>
</div></div></div></div></div><div data-element-id="elm_vLXS_T_dTZJVLQhk7UOrnw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vLXS_T_dTZJVLQhk7UOrnw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Txkc6bfOaafI3rvpMXlKEw" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-center " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_fDOWg_IylrQef0LrQyuPrw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_TBU2e6ZVuEYA3l8inI1mqA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_TBU2e6ZVuEYA3l8inI1mqA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/charles-Lks7vei-eAg-unsplash.jpg" size="medium" style="width:1600px;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div><div data-element-id="elm_ooCV9_DjA1c_ujgDzFZjkA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_AXBkSE5IGxfCt5IqNK_SSg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_AXBkSE5IGxfCt5IqNK_SSg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free Your Time</h2></div>
<div data-element-id="elm_lraklV-wX2sg9kpHcoVSnQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lraklV-wX2sg9kpHcoVSnQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Start managing the tech of your business with managed services and it'll pay off in spades.</p></div>
</div><div data-element-id="elm_skWEe0K6D2eUdYFdRGDVHw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_skWEe0K6D2eUdYFdRGDVHw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact"><span class="zpbutton-content">Get Started</span></a></div>
</div></div><div data-element-id="elm_ABSZYBUC9R1sCBKq67KGew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_MlDzNuWe3kgM5M3hkVjbPw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_MlDzNuWe3kgM5M3hkVjbPw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/zpstock-image-213.jpg" size="medium" style="width:1421px;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_orwKlIph78Aag1jtMpcauA" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_orwKlIph78Aag1jtMpcauA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Jg4H62PsL3o_JSE3lAh3sg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_Jg4H62PsL3o_JSE3lAh3sg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ayZWSa7Fqz0MPOvTpELJIQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tdVgkTdH3D32z-YekYNrkw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tdVgkTdH3D32z-YekYNrkw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Where Did Managed Services Come From?</h2></div>
<div data-element-id="elm_-fniQsRkfOmmem17SPoB_A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-fniQsRkfOmmem17SPoB_A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Historically, companies hired in-house IT technicians or outsourced for break-fix IT support. Most of this support was reactive - when something broke, a technician came to fix it. As companies began to depend more and more on uninterrupted and reliable technology, proactive IT support became the standard. If you are still relying on reactive IT support, you are falling behind. If you want your business to grow and thrive in these modern times, it's time to consider moving from reactive break-fix support to proactive managed services.</span><br></p></div>
</div><div data-element-id="elm_6lYOHl5F6MOJgMyni0JpaQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6lYOHl5F6MOJgMyni0JpaQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What Can I Do?</h2></div>
<div data-element-id="elm_gkX7UnnMZMIPfmxhefCzOw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gkX7UnnMZMIPfmxhefCzOw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Take the next step. Move away from the crisis-life to a rich and fulfilling one where you can focus on what matters most. Start managing the tech of your business with managed services.</p></div>
</div><div data-element-id="elm_Nbg2XR4OJtqhdWbyzFRxQQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Nbg2XR4OJtqhdWbyzFRxQQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact"><span class="zpbutton-content">Get Started</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 04 Nov 2020 16:55:27 -0800</pubDate></item><item><title><![CDATA[Recognizing Malicious Emails]]></title><link>https://www.newfathom.com/blogs/post/recognizing-malicious-emails</link><description><![CDATA[According to Britannica, 50% of email on the internet is spam. These emails range from selling Viagra knock-offs to trying to convince you to wire the ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_lLmkKk0yQdS_vDN48udhzw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZSETJNwoTZOn5SEK-rNL9A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_jyNCqw0sSzG3tdjsPlsFgQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_jyNCqw0sSzG3tdjsPlsFgQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_V-QGsE1Bd_yJ5qa6C8lffg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_V-QGsE1Bd_yJ5qa6C8lffg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/sapm-909485_640.jpg" size="medium" data-lightbox="true" style="width:640px;"/></picture></span></figure></div>
</div><div data-element-id="elm_1fOx-qFiS8uSNGGauRqEIA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_1fOx-qFiS8uSNGGauRqEIA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-left " data-editor="true">How to Recognize and Avoid Malicious Emails</h2></div>
<div data-element-id="elm_5Crp583LQx-J_wywdxGRAA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5Crp583LQx-J_wywdxGRAA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:justify;">According to Britannica, 50% of email on the internet is spam. These emails range from selling Viagra knock-offs to trying to convince you to wire them money. Some of these emails are so obvious they need no introduction, but cyber-criminals are becoming more and more sophisticated. In this blog we're going to help you recognize a malicious email, respond appropriately, and recover if you've fallen for them. The last section is how to prevent these things happening in the first place.</p></div>
</div><div data-element-id="elm_UgVLYP0cPn53kpWrm2Ustg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_UgVLYP0cPn53kpWrm2Ustg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1523537444585-432d2bacc10d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" data-src="https://images.unsplash.com/photo-1523537444585-432d2bacc10d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="small" data-lightbox="true" style="width:1080px;"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">Key Takeaways</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><ul><li>&nbsp; STOP! If you think an emails seems a little off, stop and investigate.<br></li><li>Check Links, Check the &quot;From&quot;, Look for Grammar mistakes and misspelled words<br></li><li>Look out for urgency and manipulation. Aka, someone wants something fast or they have something you need.</li></ul></div>
</div></div></div><div data-element-id="elm_4QvnVHpMyO9d1d5rxxapyQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_4QvnVHpMyO9d1d5rxxapyQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_FKkX2rc9m-pRMhznF_2Z-Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_FKkX2rc9m-pRMhznF_2Z-Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-type1 zpheading-align-left " data-editor="true">Types, Detecting, and Responding</h2></div>
<div data-element-id="elm_BUfzUOmmbEKYwRSQ3uz1IQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_BUfzUOmmbEKYwRSQ3uz1IQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Business Email Compromise (BEC)</h3></div>
<div data-element-id="elm_BKz4I2aiJNgIt7Nacn6rCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BKz4I2aiJNgIt7Nacn6rCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>When someone takes over a legitimate email account and uses that account to send malicious emails, that's called Business Email Compromise. These emails are the hardest to stop and detect because they usually appear to be from someone you know and trust because they are, in fact, from their email account. These accounts get taken over when someone has gotten the login information for the compromised account, they've signed in, and are using that account for their own practices.&nbsp;</p></div>
</div><div data-element-id="elm_zUwT1V3I5i8HRZwQu8WaBg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_zUwT1V3I5i8HRZwQu8WaBg"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Detecting BEC Emails</h4></div>
<div data-element-id="elm_qMj-uxXbj-8jhTeQynvGQA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qMj-uxXbj-8jhTeQynvGQA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>When you receive an email from a compromised account, it usually has a couple clear tell tale signs that it's a fake. Here's how to spot them:</p><ul><li>There's almost always a link</li><li>The link almost always takes you to a page requesting login information</li><li>It seems off and non-typical</li><li>You didn't request it</li><li>Check for bad grammar and spelling errors. Many of these people use a translator app and English isn't their first language</li></ul></div>
</div><div data-element-id="elm_8xWi3DU1C45dmLFlTU6nTQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8xWi3DU1C45dmLFlTU6nTQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Responding to BEC Emails</h4></div>
<div data-element-id="elm_OEjzQ7Hw0MHppMNYw51uxg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OEjzQ7Hw0MHppMNYw51uxg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If you've gotten a BEC email, or one that you suspect is a BEC email, what should you do?</p><ol><li>Verify that it's not legitimate</li><ol><li>If you get an email from someone that just seems off, use out-of-band communication to contact them. Do NOT email them back and ask &quot;Is this real?&quot; or use the phone number on the signature. If their email is compromised then of course they will say &quot;Of course it's legit,&quot; and the signature phone numbers are usually changed as well.&nbsp;</li><ol><li>Call the phone number of the person if you have one on file, or call their company's main number</li><li>Text them, fax them, or email someone else at their office. Use something other than that email address to contact the person. This is what we mean by &quot;out-of-band&quot; communication.&nbsp;</li></ol><li>​Examine links in the file. If it says it goes to a Word document, does the link go to OneDrive or SharePoint? Also, just because it does, doesn't mean you should go there, but that's a good way to tell if it's spam.&nbsp;<br></li><ol><li>Here's a great site to see where a link actually goes:<span style="color:rgb(48, 4, 234);">&nbsp;<span style="text-decoration-line:underline;"><a href="https://wheregoes.com/" title="https://wheregoes.com/&nbsp;" target="_blank" rel="">https://wheregoes.com/</a>&nbsp;</span></span><br></li></ol></ol><li>Find out who else in your company has also received the email and warn them, especially if it's really tricky. Warn your colleagues or contact your IT department about the scam. It just takes one person to give your company a really bad name.&nbsp;</li><li>Delete the email. Or if you're feeling like you want to have some fun, email the person back and see how long they'll talk with you. Maybe you can get them to wire you some money :-)</li></ol></div>
</div><div data-element-id="elm_Yc4ohdQzsNsykjMCM573Ig" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Yc4ohdQzsNsykjMCM573Ig"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">General Spam: Solicitations and Trickery</h3></div>
<div data-element-id="elm_iruUBfWoePA0nGevDRdgRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iruUBfWoePA0nGevDRdgRg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Sometimes the email isn't from someone you know, and they try to convince you to click a link, wire money, or the like anyway. Let's look at some types of these scams, why they happen, and how to respond. These are a different category because these usually are not legitimate accounts, but they appear legitimate.&nbsp;</p></div>
</div><div data-element-id="elm_-UGFP5tuSVeM7udN5YQatQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-UGFP5tuSVeM7udN5YQatQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Types</h4></div>
<div data-element-id="elm_yL1KITilvQKFLmbseXu_oA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_yL1KITilvQKFLmbseXu_oA"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Faking the &quot;From&quot;</h5></div>
<div data-element-id="elm_0wpx1_jQrHjyuCF6D4_lLA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0wpx1_jQrHjyuCF6D4_lLA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>A common trick out there is to change the &quot;From&quot; name of an email address. If your boss's name is Jane Smith and their email is jane@company.com, a spammer can change their name to be &quot;Jane Smith&quot; even though their email is jane@anotheremail.com. This is usually a good trick and most people don't pay attention to the whole email address. Here are the tell tale signs of these:</p><ul><li>Check the actual email address</li><li>Eventually they will ask you to send gift cards or some strange financial request (think wiring money)</li></ul></div>
</div><div data-element-id="elm_IkYA-34gUCKxpyYNULrkZQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IkYA-34gUCKxpyYNULrkZQ"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Blackmail and Heart Strings</h5></div>
<div data-element-id="elm_JqA1V6FayvxqFchb_UnYrQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JqA1V6FayvxqFchb_UnYrQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>There's really no limit to the ways scammers will try to blackmail you. My neighbor was scammed by a company she was trying to return something she'd purchased and they said they had to get on her computer and check her bank accounts to verify the purchase... well... that wasn't all they were doing. Here are some common ones:</p><ul><li>I'm a destitute person in [name of third-world country] and I need help</li><li>I have your email and password and I have sensitive information about you i'm going to publish if you don't pay me</li><li>I have naughty pictures of you and I&quot;ll release them if you don't pay me (sometimes this one is along with the one above)</li><li>We could run away together, I just need some money to come visit</li></ul></div>
</div><div data-element-id="elm_9DmmeWRqJ8ufCGsSd6SpbA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9DmmeWRqJ8ufCGsSd6SpbA"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Too Good to be True</h5></div>
<div data-element-id="elm_SV6oU2BAYIvKRqdofDfBkQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SV6oU2BAYIvKRqdofDfBkQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>This may come as a shock, but you probably aren't that lucky to win the lottery or that car, or whatever else they're selling. Don't fall for it and don't click the links!</p></div>
</div><div data-element-id="elm_i1CEtZVJsAI5_VBFWxNXCQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_i1CEtZVJsAI5_VBFWxNXCQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Detecting</h3></div>
<div data-element-id="elm_f_P54JEj03-AgnTv8tZfeg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_f_P54JEj03-AgnTv8tZfeg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Besides the signs of scammers mentioned above, there are usually a lot of other signs you can look for too in scammers emails:</p><ul><li>Poor use of the English language. English is usually not their native tongue and so an easy way to tell a scam is by how they handle the complex language:</li><ul><li>Bad grammar</li></ul></ul><ul><ul><li>Bad spelling</li><li>Weird phrasing</li></ul><li>​Check for links. It's a good idea to check any link before you click on it. Does it actually go where it should? When it's asking for a login to Microsoft, are you actually on a Microsoft web page?</li><ul><li>This is a great tool to check links:&nbsp;<a href="https://wheregoes.com/" title="https://wheregoes.com/" rel="" style="color:rgb(48, 4, 234);text-decoration-line:underline;">https://wheregoes.com/</a><br></li></ul></ul></div>
</div><div data-element-id="elm_8n9BrLB3lLofZgw8VTjbDw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_8n9BrLB3lLofZgw8VTjbDw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_TKvA1EK2L_galEVWAdqLEQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_TKvA1EK2L_galEVWAdqLEQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-type1 zpheading-align-left " data-editor="true">Recovering From Spam After You've Fallen for It</h2></div>
<div data-element-id="elm_vdz1-h98KavS83raqNt4ag" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_vdz1-h98KavS83raqNt4ag"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1533234427049-9e9bb093186d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="medium" data-lightbox="true" style="width:1080px;"/></picture></span></figure></div>
</div><div data-element-id="elm_KFYl5LaAYlHk7wdi4aW9Jw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KFYl5LaAYlHk7wdi4aW9Jw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Sometimes we all make mistakes and sometimes we realize our mistake right after we make it. If you've fallen for a BEC scam here's what you do:</p></div>
</div><div data-element-id="elm_UVttRhLMUQ_6sYkf2crRWw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_UVttRhLMUQ_6sYkf2crRWw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">If you just replied to the email</h3></div>
<div data-element-id="elm_ihlg0Qsk3Ip0Q7tZaRySTw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ihlg0Qsk3Ip0Q7tZaRySTw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><ul><li>Don't really need to do anything. You just sent them a message and engaged them. Just delete their future emails to you.</li></ul></div>
</div><div data-element-id="elm_eWvaPEUZ5DOiiRRlqBb3jA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_eWvaPEUZ5DOiiRRlqBb3jA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">If you gave them your email and password</h3></div>
<div data-element-id="elm_86oZdtIWZQcLV0avGWQSCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_86oZdtIWZQcLV0avGWQSCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><ul><li>Reset your password immediately</li><li>Reset any other accounts that use that same password</li><li>Make sure your account isn't forwarding emails to an unknown email account. This is a common tactic if an email has been compromised, then they can map out your organization long-after you've changed your password</li><li>Make sure you don't have an auto-reply you don't recognize</li></ul></div>
</div><div data-element-id="elm_AYYkTcBAH0tcnoHeV2f2kQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_AYYkTcBAH0tcnoHeV2f2kQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">If you've downloaded a program and run it</h3></div>
<div data-element-id="elm_NL_C6YCBKqqZ3rynIx5x-g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NL_C6YCBKqqZ3rynIx5x-g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><ul><li>Disconnect your computer from any network connections (WiFi and/or Ethernet)</li><li>Reset your computer and start over or rollback your computer to a backup before you ran the program</li><li>If you downloaded a file but didn't open it. Delete the program/file and run a virus scan. You may still need to reset your computer, but you may also be fine.</li></ul></div>
</div><div data-element-id="elm_aa4Ho6cVu2L4HN7-kzRLZg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_aa4Ho6cVu2L4HN7-kzRLZg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">If you did a remote session and they were on your computer</h3></div>
<div data-element-id="elm_tnsvFRifDyPVlwoq-pD7rA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tnsvFRifDyPVlwoq-pD7rA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If you made it this far with someone, they're probably after your money and it's a simple scam to that extent. I would do the same thing as the program downloaded and run.&nbsp;</p></div>
</div><div data-element-id="elm_rEQxhXvelLs9Uof4EFNIGg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_rEQxhXvelLs9Uof4EFNIGg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_DB2_fmdWAtvZUOnVjeg5WQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DB2_fmdWAtvZUOnVjeg5WQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-type1 zpheading-align-left " data-editor="true">An ounce of prevention is worth a pound of recovery</h2></div>
<div data-element-id="elm_gFjH0pCeDawtbGMoCMBOnw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gFjH0pCeDawtbGMoCMBOnw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>So, what if we just made some changes that stopped spammers in their tracks and made it much fore difficult to fall for these things in the first place? Here are some ideas that will help you be less impact if you fall for spam, and hopefully make you less likely to get it.</p><ul><li>Use Multi-Factor Authentication for your email account</li><li>Disable Auto-Forwarding in your email account (You have to be an admin to do this, but it's a really good idea)</li><li>Deploy an advanced anti-virus on your computer. This advanced anti-virus should be doing active scanning of any downloads</li><li>Deploy a password manager for you and your team</li><li>Create alerts for emails that are &quot;Faking the From&quot; so people in your company can more easily recognize them</li></ul></div>
</div><div data-element-id="elm_IV8Gvj4GREOdENU1_DLa3g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_IV8Gvj4GREOdENU1_DLa3g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 01 Oct 2020 08:58:00 -0700</pubDate></item></channel></rss>