We’ll secure your data. All of it.

  • 1 800 778 9969
  • 286 E. Hamilton Avenue, Campbell CA 95008
  • sales@trutechnical.com

Do You Know Your Top 5 Security Threats?

Half the battle for privacy and data security can be won simply by knowing what the enemy is up to when it comes to breaking in and stealing…This article explores the top 5.  To summarize (and save you some time), here they are, with some of my thoughts on each.

  1. Phishing (Sending you emails designed to take over your computer…I agree, this is a major threat. Even the trained security professional can’t always tell what’s real, and what’s an attack. The good new is, when destructive software hits your computer we can usually see it with the right detection technology in place.
  2. Ransomware – taking your computer hostage. Again, I agree this is a major threat. The media has made us somewhat numb to it, however, don’t be fooled. Hackers can easily hit you with a ransom request if you’re not well protected against them.
  3. Cloud…well, cloud isn’t an attack or threat. This article says little to explain, however let me add, most of the attacks (over 50%) over the past 12 months involve the cloud. The fact is, people falsely believe they don’t need greater protection because they are in the cloud. Your phone, laptop, or desktop, when using the cloud is the place hackers will attack. Remember, your data is not encrypted when working on it – the end node is a key part of your network and must be protected.
  4. GDPR – again this isn’t an attack or threat either – it’s a new law from our friends in Europe. That said, compliance in general has changed the way we look at security and in many cases has lulled small business owners into a false sense of security. Being PCI, HIPAA, or GDPR compliant, in no way says, your data is safe. Check the boxes, then assess risk, finally, secure the data.
  5. Crypto-mining. This one is an attack…having your computer taken over to process cryptocurrency illegally. It will eat up your bandwidth, computing power, and may point to you as the perp. Crypto-miners take over systems and use them for their crime…make sure this doesn’t happen to you. Some simple tests can tell us if your system is being used for this type of crime.

https://www.techrepublic.com/article/cybersecurity-rundown-the-5-most-critical-threats-to-businesses-in-2018/

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Did You Know Your Phone Can Recognize Your Face?

The future of identifying and authenticating may be in your face. Here’s how it works and why it’s hard to fool the computer. That said, what happens when hackers do figure out ways to fool authentication machines based on facial recognition? You can’t change your face in the same way you change your password. https://lnkd.in/g3GYwzH

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Did You Know Passwords Don’t Keep Your Data Safe?

We all use passwords, however, they’re not the best security. And in the future I expect to see passwords replaced. We’re already seeing cloud providers and enterprise companies moving to something called “Dual Authentication”…this simply means, having something and knowing something…the simplest way to do this seems to be getting a text to your phone (Something you have to have on you at the moment) – a one time password you know, which lasts for just a few minutes…This articles explains where passwords came from and why they don’t work.

https://www.computerweekly.com/opinion/Security-Think-Tank-Passwords-alone-are-not-good-enough

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

We All Know What Ransomware is Now – What About Cryptojacking?

If you don’t know what this is, it’s important – cryptocurrency mining malware is what hackers use to steal (mine) cryptocurrencies like Bitcoin.

Why is this important? Because these unsuspecting thieves need lots of computing power to mine these digital dollars, and they’re using your computer to do it. At least two problems result – one, your computer is involved in stealing and you might be held accountable if you can’t prove it’s not you doing it. Second, it will take your computer’s performance from good to its knees in no time.

Next time you hear someone say, my computer’s slow today – pause to consider if you really want them working on your stuff.

https://www.databreachtoday.com/cryptojacking-displaces-ransomware-as-top-malware-threat-a-11165

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Data is a Currency – Your Data Is Important. Do You Know What Others Are Doing With it?

Here’s a great breakdown on what many big software companies are doing with your data – to track you, make money off you, and learn more about you (for many reasons including marketing). We’re all using the cloud – however, that doesn’t mean your security and privacy concern have disappeared. In fact, cloud demands a closer look at who has your data and what they plan to do with it.

https://flipboard.com/@flipboard/-what-tech-giants-really-do-with-your-da/f-d3db706e0b%2Fco.uk

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Do You Know Your Top 5 Security Threats?

Half the battle for privacy and data security can be won simply by knowing what the enemy is up to when it comes to breaking in and stealing…This article explores the top 5.  To summarize (and save you some time), here they are, with some of my thoughts on each.

  1. Phishing (Sending you emails designed to take over your computer…I agree, this is a major threat. Even the trained security professional can’t always tell what’s real, and what’s an attack. The good new is, when destructive software hits your computer we can usually see it with the right detection technology in place.
  2. Ransomware – taking your computer hostage. Again, I agree this is a major threat. The media has made us somewhat numb to it, however, don’t be fooled. Hackers can easily hit you with a ransom request if you’re not well protected against them.
  3. Cloud…well, cloud isn’t an attack or threat. This article says little to explain, however let me add, most of the attacks (over 50%) over the past 12 months involve the cloud. The fact is, people falsely believe they don’t need greater protection because they are in the cloud. Your phone, laptop, or desktop, when using the cloud is the place hackers will attack. Remember, your data is not encrypted when working on it – the end node is a key part of your network and must be protected.
  4. GDPR – again this isn’t an attack or threat either – it’s a new law from our friends in Europe. That said, compliance in general has changed the way we look at security and in many cases has lulled small business owners into a false sense of security. Being PCI, HIPAA, or GDPR compliant, in no way says, your data is safe. Check the boxes, then assess risk, finally, secure the data.
  5. Crypto-mining. This one is an attack…having your computer taken over to process cryptocurrency illegally. It will eat up your bandwidth, computing power, and may point to you as the perp. Crypto-miners take over systems and use them for their crime…make sure this doesn’t happen to you. Some simple tests can tell us if your system is being used for this type of crime.

https://www.techrepublic.com/article/cybersecurity-rundown-the-5-most-critical-threats-to-businesses-in-2018/

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Did You Know Your Phone Can Recognize Your Face?

The future of identifying and authenticating may be in your face. Here’s how it works and why it’s hard to fool the computer. That said, what happens when hackers do figure out ways to fool authentication machines based on facial recognition? You can’t change your face in the same way you change your password. https://lnkd.in/g3GYwzH

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Did You Know Passwords Don’t Keep Your Data Safe?

We all use passwords, however, they’re not the best security. And in the future I expect to see passwords replaced. We’re already seeing cloud providers and enterprise companies moving to something called “Dual Authentication”…this simply means, having something and knowing something…the simplest way to do this seems to be getting a text to your phone (Something you have to have on you at the moment) – a one time password you know, which lasts for just a few minutes…This articles explains where passwords came from and why they don’t work.

https://www.computerweekly.com/opinion/Security-Think-Tank-Passwords-alone-are-not-good-enough

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

We All Know What Ransomware is Now – What About Cryptojacking?

If you don’t know what this is, it’s important – cryptocurrency mining malware is what hackers use to steal (mine) cryptocurrencies like Bitcoin.

Why is this important? Because these unsuspecting thieves need lots of computing power to mine these digital dollars, and they’re using your computer to do it. At least two problems result – one, your computer is involved in stealing and you might be held accountable if you can’t prove it’s not you doing it. Second, it will take your computer’s performance from good to its knees in no time.

Next time you hear someone say, my computer’s slow today – pause to consider if you really want them working on your stuff.

https://www.databreachtoday.com/cryptojacking-displaces-ransomware-as-top-malware-threat-a-11165

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Data is a Currency – Your Data Is Important. Do You Know What Others Are Doing With it?

Here’s a great breakdown on what many big software companies are doing with your data – to track you, make money off you, and learn more about you (for many reasons including marketing). We’re all using the cloud – however, that doesn’t mean your security and privacy concern have disappeared. In fact, cloud demands a closer look at who has your data and what they plan to do with it.

https://flipboard.com/@flipboard/-what-tech-giants-really-do-with-your-da/f-d3db706e0b%2Fco.uk

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Are you ready to limit your Cyber business risk?

Click the button below to get started!

Get Started