We’ll secure your data. All of it.

  • 1 800 778 9969
  • 286 E. Hamilton Avenue, Campbell CA 95008
  • sales@trutechnical.com

Attention Business Owners: 5 Questions You Should Be Able To Answer, Even if Your a Small Business

Cybersecurity is a leadership issue – not an IT problem. It affects every aspect of your business, and if you have a board, they too, should be aware of a few things. Here are 5 questions you should be able to answer – and as the answer change over time, you and your management should be keeping pace:

What is your current exposure? The attached article says, “Are you secure”? In my opinion, they’ve phrased this question so it can’t really be answered. Exposure assumes you can be attacked (and you can) and instead asks, what’s the likelihood certain “bad” things will happen.

Can you detect before it’s too late? In the attached article, you’ll read – “How do we know if we’ve been breached?” Both are accurate, however, the point is, can you detect fast enough. Eventually, everyone knows – in most cases they know too late.

How does your security program compare with others in your industry? This matters believe it or not. Not that you’re gaining a competitive advantage (which in most cases you’re not). But if breached, you’ll want to show you have done what any smart business would do, and what is expected of a company like yours. This speaks to something called, Due Care, a term that may come up if your clients discover a breach and sue.

Do you have enough resources to handle security? In most cases the answer will be no, unless you’ve contracted with third party providers. The truth is, there’s a lack of cybersecurity talent out there, and the great security experts are not taking jobs with small businesses – they work for IT providers and very large fortune 500 businesses.

How effective is your security program? Effective speaks to your ability to stay up and running – the detect disasters when they are just starting, heading them off before any real damage is done.

Learn more in this attached article…

https://www.darkreading.com/…/cisos-how-to-a…/a/d-id/1332914

P.S. Are hackers stealing your data? Get my pdf download, 5 Signs You’ve Been Hacked! You can request it here for free: https://trutechnical.biz/stop-hackers-now

Keeping Your Data Safe Depends on Detection…You Can’t Really Keep Them Out

Here’s the good news when it comes to securing data – “Just because cyber criminals are tech-savvy doesn’t mean they’re not also lazy and prone to errors. You may not be able to understand the malicious code they write and deploy, but thanks to advances in threat detection, you don’t need to…”. Now the bad news. Most businesses have nothing in place to detect these patterns and mistakes…so even the sloppy criminals get away without your data…make sure you have the right detection in place. Read more about how hackers get caught and what you should be doing to keep them from actually getting to your data.

https://www.helpnetsecurity.com/2018/10/02/data-point-threat-investigation/

P.S. Are hackers stealing your data? Get my report featuring the top 5 Signs You’ve Been Hacked! You can request it here for free: https://trutechnical.biz/stop-hackers-now

Small Business – The Hackers #1 Target. Here’s What You Can Do To Lock Things Down

Experts tell us – small business is the target. There are several things you can do to tighten up security – here’s a link to 5 good ones. My favorite in this list is putting in place a process to authorize wire transfers. You’d think that is the bank’s job, however banking agreements state, in most cases, you have just 24 hours to catch a fraudulent wire transfer! Just 24 hours…

Your personal banking offers 60 days…enough time in many cases to spot something. 24 Hours is just not enough time. The hacker takes over the managers email (related to item one on the list), then sends a request for payment to AP…the person there sends the money. 24 hours later, the hacker owns that money and chances of getting caught are almost zero.
https://www.entrepreneur.com/article/319325


P.S. Have you seen David Stelzl’s eBook on protecting data and privacy? You can request it here for free… https://lnkd.in/gKAik7p

Would You Pay the Ransom?

There are numerous reasons not to pay the ransom including the fact that you still might not get your data back and the likelihood of the attackers returning far more is high… That said, not paying is another disaster you can’t afford. The only good answer to prevention! Which is easier said than done. The good news is, if your patches are up to date and your end nodes are well protected, the likelihood of being successfully attacked by ransomware software is low! Check out what Gartner says about paying the ransom…

P.S. Have you seen David Stelzl’s eBook on protecting data and privacy? You can request it here for free… https://lnkd.in/gKAik7p

Most Hacker Attacks Don’t Involve Bad Links! You’ll Be Amazed At How The Ruse Begins

All email based attacks involve some sort of social engineering ruse…meaning the attacker starts by tricking you somehow…however, the common misconception is, the attack requires clicking a link. Not True… Over half the attacks happening right now start with a conversation – someone pretending to be someone you should be talking to! This one thing wipes out most of the security technology out there…you can’t block a conversation that seems friendly or business related, and our ability to discern who is good and who isn’t, when it’s electronic, is far from adequate. Learn to test people before engaging. If an email asks you to call a number, look it up. Like a help desk agent, it doesn’t hurt to ask a question your caller or emailer should know. Sometimes we get tired of answering the question, “What was your first car?” And maybe that one isn’t so hard to answer. However, there are plenty of things you can ask someone at work… https://lnkd.in/gZ_57MR

P.S. Have you seen David Stelzl’s eBook on protecting data and privacy? You can request it here for free… https://lnkd.in/gKAik7p

Attention Business Owners: 5 Questions You Should Be Able To Answer, Even if Your a Small Business

Cybersecurity is a leadership issue – not an IT problem. It affects every aspect of your business, and if you have a board, they too, should be aware of a few things. Here are 5 questions you should be able to answer – and as the answer change over time, you and your management should be keeping pace:

What is your current exposure? The attached article says, “Are you secure”? In my opinion, they’ve phrased this question so it can’t really be answered. Exposure assumes you can be attacked (and you can) and instead asks, what’s the likelihood certain “bad” things will happen.

Can you detect before it’s too late? In the attached article, you’ll read – “How do we know if we’ve been breached?” Both are accurate, however, the point is, can you detect fast enough. Eventually, everyone knows – in most cases they know too late.

How does your security program compare with others in your industry? This matters believe it or not. Not that you’re gaining a competitive advantage (which in most cases you’re not). But if breached, you’ll want to show you have done what any smart business would do, and what is expected of a company like yours. This speaks to something called, Due Care, a term that may come up if your clients discover a breach and sue.

Do you have enough resources to handle security? In most cases the answer will be no, unless you’ve contracted with third party providers. The truth is, there’s a lack of cybersecurity talent out there, and the great security experts are not taking jobs with small businesses – they work for IT providers and very large fortune 500 businesses.

How effective is your security program? Effective speaks to your ability to stay up and running – the detect disasters when they are just starting, heading them off before any real damage is done.

Learn more in this attached article…

https://www.darkreading.com/…/cisos-how-to-a…/a/d-id/1332914

P.S. Are hackers stealing your data? Get my pdf download, 5 Signs You’ve Been Hacked! You can request it here for free: https://trutechnical.biz/stop-hackers-now

Keeping Your Data Safe Depends on Detection…You Can’t Really Keep Them Out

Here’s the good news when it comes to securing data – “Just because cyber criminals are tech-savvy doesn’t mean they’re not also lazy and prone to errors. You may not be able to understand the malicious code they write and deploy, but thanks to advances in threat detection, you don’t need to…”. Now the bad news. Most businesses have nothing in place to detect these patterns and mistakes…so even the sloppy criminals get away without your data…make sure you have the right detection in place. Read more about how hackers get caught and what you should be doing to keep them from actually getting to your data.

https://www.helpnetsecurity.com/2018/10/02/data-point-threat-investigation/

P.S. Are hackers stealing your data? Get my report featuring the top 5 Signs You’ve Been Hacked! You can request it here for free: https://trutechnical.biz/stop-hackers-now

Small Business – The Hackers #1 Target. Here’s What You Can Do To Lock Things Down

Experts tell us – small business is the target. There are several things you can do to tighten up security – here’s a link to 5 good ones. My favorite in this list is putting in place a process to authorize wire transfers. You’d think that is the bank’s job, however banking agreements state, in most cases, you have just 24 hours to catch a fraudulent wire transfer! Just 24 hours…

Your personal banking offers 60 days…enough time in many cases to spot something. 24 Hours is just not enough time. The hacker takes over the managers email (related to item one on the list), then sends a request for payment to AP…the person there sends the money. 24 hours later, the hacker owns that money and chances of getting caught are almost zero.
https://www.entrepreneur.com/article/319325


P.S. Have you seen David Stelzl’s eBook on protecting data and privacy? You can request it here for free… https://lnkd.in/gKAik7p

Would You Pay the Ransom?

There are numerous reasons not to pay the ransom including the fact that you still might not get your data back and the likelihood of the attackers returning far more is high… That said, not paying is another disaster you can’t afford. The only good answer to prevention! Which is easier said than done. The good news is, if your patches are up to date and your end nodes are well protected, the likelihood of being successfully attacked by ransomware software is low! Check out what Gartner says about paying the ransom…

P.S. Have you seen David Stelzl’s eBook on protecting data and privacy? You can request it here for free… https://lnkd.in/gKAik7p

Most Hacker Attacks Don’t Involve Bad Links! You’ll Be Amazed At How The Ruse Begins

All email based attacks involve some sort of social engineering ruse…meaning the attacker starts by tricking you somehow…however, the common misconception is, the attack requires clicking a link. Not True… Over half the attacks happening right now start with a conversation – someone pretending to be someone you should be talking to! This one thing wipes out most of the security technology out there…you can’t block a conversation that seems friendly or business related, and our ability to discern who is good and who isn’t, when it’s electronic, is far from adequate. Learn to test people before engaging. If an email asks you to call a number, look it up. Like a help desk agent, it doesn’t hurt to ask a question your caller or emailer should know. Sometimes we get tired of answering the question, “What was your first car?” And maybe that one isn’t so hard to answer. However, there are plenty of things you can ask someone at work… https://lnkd.in/gZ_57MR

P.S. Have you seen David Stelzl’s eBook on protecting data and privacy? You can request it here for free… https://lnkd.in/gKAik7p

Are you ready for your FREE Evaluation of Your security?

Click the button below to get started!

Get Started