We’ll secure your data. All of it.

  • 1 800 778 9969
  • 286 E. Hamilton Avenue, Campbell CA 95008
  • sales@trutechnical.com

Blog / Home / Blog

Would You Pay the Ransom? (Listen to the Audio)

There are numerous reasons not to pay the ransom including the fact that you still might not get your data back and the likelihood of the attackers returning far more is high… That said, not paying is another disaster you can’t afford. The only good answer to prevention! Which is easier said than done. The good news is, if your patches are up to date and your end nodes are well protected, the likelihood of being successfully attacked by ransomware software is low! Check out what Gartner says about paying the ransom…

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Most Hacker Attacks Don’t Involve Bad Links! You’ll Be Amazed At How The Ruse Begins

All email based attacks involve some sort of social engineering ruse…meaning the attacker starts by tricking you somehow…however, the common misconception is, the attack requires clicking a link. Not True…

Over half the attacks happening right now start with a conversation – someone pretending to be someone you should be talking to! This one thing wipes out most of the security technology out there…you can’t block a conversation that seems friendly or business related, and our ability to discern who is good and who isn’t, when it’s electronic, is far from adequate.  Learn to test people before engaging. If an email asks you to call a number, look it up. Like a help desk agent, it doesn’t hurt to ask a question your caller or emailer should know. Sometimes we get tired of answering the question, “What was your first car?” And maybe that one isn’t so hard to answer. However, there are plenty of things you can ask someone at work…

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

These Attacks Are Nearly Impossible To Detect Without Special Expertise and Equipment…

What’s a fileless attack?  Well, most attacks on computers involve some sort of file, like a PDF attached to an email or an executable program that sits on your computer somewhere.  A fileless attack has none of this, making it nearly impossible to detect with traditional products that look for malware in a traditional form. In the fileless attack, the program is hidden in memory on your computer by not present on your hard drive…

How do you stop these attacks? Newer technology is designed to find these – however, the hackers are always one step ahead. The key is to be looking for fileless attacks and watching for the symptoms of compromise…computing patterns change, data transmissions change, and a number of other things start to look different on your network once compromised…ongoing detection and response is the foundation of great security.

https://www.axios.com/hard-to-detect-form-of-cyberattack-soars-cf614be5-3bc0-4266-a48e-fb2a81127bd8.html

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Does Incognito Mode on Your Browser Actually Keep Your Web Searches Private?

The common belief is that Incognito keeps your web life a secret. While this might change by the time you read this article, I’m posting it to show that you don’t really know what’s going on behind the scenes – it’s a matter of trust. Is your data, activity, life…really a secret and really secure. You just don’t know. Security is a funny thing – it’s impossible for the average user to tell what software companies do, what’s on their computer, who has access…etc. Regular risk assessments are one way to at least check for symptoms of compromise. Don’t go on without at least checking regularly…

And here are some steps you can take with Incognito mode to tighten things up…

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Attention Small Business Owners…You’re A Target (and a big one for today’s hacker).

Small business attacks are increasing. It’s tempting to think, “Our business is to small to hack” or the common, “No one’s even heard of our company”. This is especially true if your business is out in a rural area. People become complacent with security when their physical surroundings seem so calm and unaffected by rising crime rates.

The truth is, more than half of small businesses are affected by cybercrime each year…find out what hackers are doing to gain access to your data without actually knowing your company by name.

https://www.techrepublic.com/article/smbs-at-higher-risk-of-sophisticated-cyberattacks-here-are-the-top-threats/

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Are you ready to limit your Cyber business risk?

Click the button below to get started!

Get Started