We’ll secure your data. All of it.

  • 1 800 778 9969
  • 286 E. Hamilton Avenue, Campbell CA 95008
  • sales@trutechnical.com

Blog / Home / Blog

Fake News is Growing – This Might Not Steal Your Data, But it Will Affect Your Life

Fake news is the growing trend – in fact, security experts tell us most of the news out there will be fake in the very near future. Why does this matter? Because laws, votes, trends, and more are all driven in part by news and media. So, when someone reads something on The WSJ front page, and they’re a regular subscriber, they tend to believe it…what if it just looks like the WSJ front page? Be careful what you read – more importantly, make sure someone it monitoring your online reputation. This is easy to do by setting up alerts on Google to notify you whenever you or your company are mentioned online! https://lnkd.in/gZqtmZP

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Did You Know, Deleting Files Doesn’t Actually Destroy The Data?

You can use a hammer, soak your computer in water (or gasoline), etc. And there are utilities on some devices such as a smartphone – actually designed to destroy data before you sell your outdated device. However, it’s not always clear. Deleting data often leaves the data intact, meaning you buyer on eBay, or your local dumpster diver now has your data. This article provides some detail, or check with us – in every case, make sure your data really is gone before you sell or dispose of any computer device!

https://www.zdnet.com/pictures/how-to-securely-wipe-the-data-off-hard-drives-ssds-flash-drives-iphones-and-ipads-and-android/

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

It’s Easy To Break Into Networks…Easier Than You Think, So What Should You Do?

This article shows how a security company running tests on live networks was able to break in over 80% of the time simply by exploiting known issues…meaning the hackers know them too! What’s the solution? Regular assessments can show us which of these holes exist in your network – we recommend quarterly.  In addition, having a way to detect intrusion is essential. Like the door on your house, it’s not that hard to break through – the questions is, does your alarm go off, and does something happen to stop the attack when it does?

https://gizmodo.com/simulated-attacks-reveal-how-easily-corporate-networks-1827841916

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Where to Buy Drugs, Guns, Child Porn, and Malware…

Of course you’re probably not in the market for any of the above – however, this is what’s available on what we call The Dark Web…a part of the Internet not easily accessible to the average user – unless they come with a reference…Google, Yahoo, Bing..these browsers don’t search the Dark Web – however, it’s real and alive right now. This is where just about anyone (with a reference) can buy software designed to break into your computers! In other words, you don’t have to be technical….you just need approval to access this part of the Internet, and money to buy Malware (and a dulled conscience that allows you to actively break into other people’s networks for financial gain. The most important thing to understand is, many of these attacks are carried out in an automated fashion, so the hacker does not need to know you – they just send out the attacks and see where they land. Make sure you’re protected – stealing online is getting easier, and security requirements are constantly changing.

https://www.computerweekly.com/feature/An-insiders-look-into-the-dark-web

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Do You Know Your Top 5 Security Threats?

Half the battle for privacy and data security can be won simply by knowing what the enemy is up to when it comes to breaking in and stealing…This article explores the top 5.  To summarize (and save you some time), here they are, with some of my thoughts on each.

  1. Phishing (Sending you emails designed to take over your computer…I agree, this is a major threat. Even the trained security professional can’t always tell what’s real, and what’s an attack. The good new is, when destructive software hits your computer we can usually see it with the right detection technology in place.
  2. Ransomware – taking your computer hostage. Again, I agree this is a major threat. The media has made us somewhat numb to it, however, don’t be fooled. Hackers can easily hit you with a ransom request if you’re not well protected against them.
  3. Cloud…well, cloud isn’t an attack or threat. This article says little to explain, however let me add, most of the attacks (over 50%) over the past 12 months involve the cloud. The fact is, people falsely believe they don’t need greater protection because they are in the cloud. Your phone, laptop, or desktop, when using the cloud is the place hackers will attack. Remember, your data is not encrypted when working on it – the end node is a key part of your network and must be protected.
  4. GDPR – again this isn’t an attack or threat either – it’s a new law from our friends in Europe. That said, compliance in general has changed the way we look at security and in many cases has lulled small business owners into a false sense of security. Being PCI, HIPAA, or GDPR compliant, in no way says, your data is safe. Check the boxes, then assess risk, finally, secure the data.
  5. Crypto-mining. This one is an attack…having your computer taken over to process cryptocurrency illegally. It will eat up your bandwidth, computing power, and may point to you as the perp. Crypto-miners take over systems and use them for their crime…make sure this doesn’t happen to you. Some simple tests can tell us if your system is being used for this type of crime.

https://www.techrepublic.com/article/cybersecurity-rundown-the-5-most-critical-threats-to-businesses-in-2018/

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Are you ready to limit your Cyber business risk?

Click the button below to get started!

Get Started