cyberthreat collateral damage

When it comes to cyberattacks, the mid-market is often collateral damage

Dror Liwer Blog

How can small businesses protect their assets from becoming collateral damage in a cyberattack? Large enterprises and international corporations are shining targets for hackers. From industrial espionage to ransomware, data theft is an obvious jackpot for malicious parties. We pay plenty of attention to enterprise threats and risk management. But we need to speak up about about the risks to …

Cyberthreats for the rest of 2022

Cyberthreats for the rest of 2022

Dror Liwer Blog

Since the start of 2020, a cyber-warfare storm has been brewing. Hundreds of thousands of mid-sized businesses lie in its path. Cyberthreats are common occurrences. In fact, they’re so common that every company falls into one of two categories: Companies that have already suffered a security breach. Companies that are about to suffer a security breach. How do we know? …

Airport cybersecurity

Dror Liwer Blog

Airport cybersecurity is crucial for guarding our personal data – not to mention our lives. But the aviation industry rarely meets basic security standards. When it comes to protecting its cyber systems from attack, they’ve dropped the ball. In 2020, Swiss researchers identified “massive cybersecurity risks” at 97 of the world’s top 100 airports. Actually, only three of the world’s …

Does a Hidden SSID Make You Feel Safe? It Shouldn’t. Here’s Why.

Dror Liwer Blog

Do Hidden SSIDs Work? The logic makes sense: If it can’t be seen, it can’t be attacked. But that logic doesn’t always work with wireless SSID. Many businesses and individuals hide their SSIDs (known fully as a Service Set Identifier) with the hope of eluding hackers. A prevailing theory in security has long held that by cloaking an SSID, hackers …

Retail SMBs and Payment Data Risks

Dror Liwer Blog

Cyber-attackers continue to use creative methods of exploiting vulnerabilities. They’ve turned their attention to the manufacturing and retail sectors, using mobile apps and cloud technology to their own advantage. Proper security requires more than stronger passwords or releasing a memo to personnel regarding known email phishing attempts. Modern threats require forward-thinking solutions and a wide net of tools to mitigate …

SMBs State of Cloud Data Security

Dror Liwer Blog

Small and Medium-sized businesses are often viewed as soft targets by criminals operating in the cloud. While it seems counterintuitive that hackers would go after smaller data caches or command ransom from those less likely to afford it, the lax security measures employed by the vast majority of SMBs leaves them extremely vulnerable. Effective cloud security for small business requires …

HIPAA and EMR Cyber Security

Dror Liwer Blog

HIPAA cyber security is on every medical provider’s mind these days. One vulnerability in the cyber security of a hospital or doctor’s office can leave personal patient data wide open for hackers to steal. They might demand a ransom in exchange for an encryption key to use the data again, or they may sell the information to the highest bidder. …

What Coro is doing to ensure business continuity

Dror Liwer Blog

In the last few weeks, reality seems like a movie. Businesses big or small are affected by the Coronavirus (also known as COVID-19). With the virus’s rapid spread, the ban on gathering and quarantine regulations will only get tighter. The only way to ensure business continuity while complying with new government regulations and directives is to allow employees to work …

MSP? Here are 5 ways to win and keep a client!

Dror Liwer Blog

Here’s a shocker: 93% of SMBs said they would switch MSPs to get adequate cyber security coverage.   Some might see this as Armageddon, but we see this as an incredible opportunity to retain your existing customers, and recruit many new ones.   We narrowed it down to these 5 strategies:  Actively stress the importance of cybersecurity. Let current and potential clients …