We’ll secure your data. All of it.

  • 1 800 778 9969
  • 286 E. Hamilton Avenue, Campbell CA 95008
  • sales@trutechnical.com

Warning! The Internet Isn’t As Private As You Think It Is…

It’s important to think before putting something online.

That goes for email, social media posts, and of course, your company data.

The attached article shows how easy it is to take data, seemingly anonymous, and to attach names to it.

In this news report, medical information was put online (In the cloud).

Computers were then used to search the internet, looking for public information that matched the medical records – in a short amount of time they had names to go with each medical entry, exposing one’s entire medical history.

You can’t control what your doctor puts in the cloud, however you can limit your personal information.

https://www.theguardian.com/world/2018/jul/13/anonymous-browsing-data-medical-records-identity-privacy

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Are Hackers Selling Access to Your Computer?

The going rate is just $10…

One common misconception is, someone has to hack into your computer to gain access to it…

But the truth is, hackers are selling access to computers compromised long ago. So everything might look okay, when in fact, a “Back Door” exists using software you’ll never detect.

This is why it is so important to have a security “DETECTION” strategy in place. Detection works, where trying to firewall the hacker out, won’t. The software used in these exploits grants permission to the PC, so it’s an approved firewall traffic source.

However, a detection technology will see traffic it suspects to be malicious, notify the security engineer, and call for some investigation. This article explains just how easy it is to be compromised in this way.

https://www.zdnet.com/article/hackers-are-selling-backdoors-into-pcs-for-just-10/

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Unpatched Software? The Hacker’s In? (Note: Your Phone Included).

If you’re wondering why we place so much emphasis on patching software, it’s because hackers love security holes in software – that’s how they get in. The good news is, 86% of software holes have a fix within a day (24hrs.)  If people kept their patches up to date, many of the news reports you read about would have never happened. People don’t realize it, but software contains millions of lines of code – with potential security holes occurring throughout.  Coding errors lead to vulnerabilities, which lead to lost and stolen data…Don’t let your systems go without regular patching/updates – especially on those devices you personally maintain such as you smartphone and home computer.

..https://www.databreachtoday.com/complexities-vulnerability-management-what-needs-to-be-done-a-11276

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Data Theft Happens Inside More Than You Realize

Over 75% of employees admitted (in a recent WSJ Survey), they steal company data…it happens more than you think it does. People are tempted, they run into major financial trouble, or they react to something in the office…and they steal. You can’t simply put a firewall in place, access control is an essential element in the security strategy. If you’re using shared network drives, chances are you have no way to know who accessed what and when…if something gets deleted, moved, changed, or misused, you’ll want to know…If you’re not sure how to solve this problem, let us know…

http://www.eweek.com/security/research-indicates-ceos-other-execs-routinely-steal-company-ip

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Is Your Website Telling Your Clients You’re Not Secure?

Recently Google announced it would be notifying people when they try to access websites not updated with SSL (a security feature or certificate used to secure data)…if you’re not sure, go to your site now and look at the URL – does it start with HTTP:// or does it say, HTTPS://, the later is correct. If you’re not up to date, contact us immediately and we’ll help you get this fixed…

https://ducttapemarketingconsultant.com/https-migration/

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Warning! The Internet Isn’t As Private As You Think It Is…

It’s important to think before putting something online.

That goes for email, social media posts, and of course, your company data.

The attached article shows how easy it is to take data, seemingly anonymous, and to attach names to it.

In this news report, medical information was put online (In the cloud).

Computers were then used to search the internet, looking for public information that matched the medical records – in a short amount of time they had names to go with each medical entry, exposing one’s entire medical history.

You can’t control what your doctor puts in the cloud, however you can limit your personal information.

https://www.theguardian.com/world/2018/jul/13/anonymous-browsing-data-medical-records-identity-privacy

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Are Hackers Selling Access to Your Computer?

The going rate is just $10…

One common misconception is, someone has to hack into your computer to gain access to it…

But the truth is, hackers are selling access to computers compromised long ago. So everything might look okay, when in fact, a “Back Door” exists using software you’ll never detect.

This is why it is so important to have a security “DETECTION” strategy in place. Detection works, where trying to firewall the hacker out, won’t. The software used in these exploits grants permission to the PC, so it’s an approved firewall traffic source.

However, a detection technology will see traffic it suspects to be malicious, notify the security engineer, and call for some investigation. This article explains just how easy it is to be compromised in this way.

https://www.zdnet.com/article/hackers-are-selling-backdoors-into-pcs-for-just-10/

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Unpatched Software? The Hacker’s In? (Note: Your Phone Included).

If you’re wondering why we place so much emphasis on patching software, it’s because hackers love security holes in software – that’s how they get in. The good news is, 86% of software holes have a fix within a day (24hrs.)  If people kept their patches up to date, many of the news reports you read about would have never happened. People don’t realize it, but software contains millions of lines of code – with potential security holes occurring throughout.  Coding errors lead to vulnerabilities, which lead to lost and stolen data…Don’t let your systems go without regular patching/updates – especially on those devices you personally maintain such as you smartphone and home computer.

..https://www.databreachtoday.com/complexities-vulnerability-management-what-needs-to-be-done-a-11276

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Data Theft Happens Inside More Than You Realize

Over 75% of employees admitted (in a recent WSJ Survey), they steal company data…it happens more than you think it does. People are tempted, they run into major financial trouble, or they react to something in the office…and they steal. You can’t simply put a firewall in place, access control is an essential element in the security strategy. If you’re using shared network drives, chances are you have no way to know who accessed what and when…if something gets deleted, moved, changed, or misused, you’ll want to know…If you’re not sure how to solve this problem, let us know…

http://www.eweek.com/security/research-indicates-ceos-other-execs-routinely-steal-company-ip

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Is Your Website Telling Your Clients You’re Not Secure?

Recently Google announced it would be notifying people when they try to access websites not updated with SSL (a security feature or certificate used to secure data)…if you’re not sure, go to your site now and look at the URL – does it start with HTTP:// or does it say, HTTPS://, the later is correct. If you’re not up to date, contact us immediately and we’ll help you get this fixed…

https://ducttapemarketingconsultant.com/https-migration/

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Are you ready to limit your Cyber business risk?

Click the button below to get started!

Get Started