Fixing Your Weakest Link: Your Employees

Even if you have every security hardware/software available, such as a firewall, backup disaster recovery device, and anti-virus, your employees could still be your organization’s most significant vulnerability regarding phishing attacks. How can you minimize the risk as much as possible?  Create and Strictly Enforce a Password Policy Passwords should be complex, randomly generated, and replaced regularly. When creating a …

How to Spot A Phishing Attack

Would you know if you were the subject of a phishing attack? Many people claim they could tell immediately if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing websites every month. A 65% increase in attacks in one year! Hackers would have moved on to their next idea …

What Is Phishing & How Are Hackers Using It?

Although the number of individuals who fall for the infamous Nigerian prince scam has declined, phishing remains a significant concern. In fact, over the past year, hackers worldwide have executed 65% more phishing attacks.  Phishing is a fraudulent activity where hackers create emails, forms, and websites that look like those of legitimate companies to trick people into sharing their sensitive …

paper money

Financial Services Industry & The Benefits of Managed IT Services

Discover how Managed IT Services can revolutionize your business operations and enhance efficiency. Streamlining Business Operations Managed IT Services play a crucial role in streamlining business operations for the financial services industry. By outsourcing the management of IT infrastructure and systems, financial institutions can focus on their core competencies and strategic initiatives. This allows for greater efficiency and productivity, as …

patch-management

How to know if your Company is Vulnerable to Attacks

Online safety is crucial for any business, and neglecting to take the necessary precautions to protect your company from malicious online threats can lead to severe consequences for you and your customers. Cyber crimes can cost businesses up to 1.33 billion dollars annually, which can significantly disrupt your company’s financial plans. Therefore, ensuring your company is prepared to face these …

random code screenshot

Making Cybersecurity a Priority

Cybercriminals and data brokers are a common threat to businesses nationwide, which is why infrastructure integrity is something companies need to understand to ensure online safety. Infrastructure integrity refers to the setup you have to promote safety and security; it includes firewalls, anti-virus software, and backups.  You risk compromising your sensitive data if you have yet to invest in cybersecurity. …

Safeguarding Hospitality: The Vital Role of Cybersecurity

In an era where technology informs nearly every aspect of our lives, the hospitality industry is no exception. From online bookings to mobile check-ins and smart room amenities, technology has revolutionized the guest experience at hotels and resorts. While these advancements have undoubtedly enriched the guest experience, they have also opened the doors to a new set of challenges—cybersecurity threats. …

Inc. 5000 logo

Decypher Technologies Ranks on the 2023 Inc. 5000

NEW YORK, August 15, 2023 – Inc. revealed today that Decypher Technologies ranks No. 3962 on the 2023 Inc. 5000, its annual list of the fastest-growing private companies in America. The prestigious ranking provides a data-driven look at the most successful companies within the economy’s most dynamic segment—its independent, entrepreneurial businesses. Facebook, Chobani, Under Armour, Microsoft, Patagonia, and many other …

man snacking at his PC

Where do cyber-attacks start?

Cyberattacks can happen on any device at any given time, so how do you know which of your devices you need to protect? It helps first to clarify where these attacks come from. In the past, attacks came from outside sources, or, in other words, the internet. Cybersecurity companies combatted these attacks by setting up firewalls, Intrusion Detection System (IDS), …

fading man at a laptop

Understanding different types of Malware

Malicious software — or malware — is talked about when dangerous software is used to access and infect a computer or network without being detected. A lot of people hear terms like viruses, adware, spyware, ransomware, worms, or Trojan horses; these are all different types of malware that can severely damage computers, devices, and networks. Cybersecurity companies like Decypher Technologies …

average time to identify and contain a data breach

What is Cyber Insurance and why it’s important

In today’s digital age, businesses are becoming increasingly dependent on technology. With the rise of cyber threats, cyber insurance has become a crucial part of a comprehensive risk management strategy for businesses of all sizes. Cyber insurance covers financial losses and legal liabilities from cyber-attacks and data breaches. These losses can include the cost of responding to a breach, such …

man disintegrating in front of the PC

Cybersecurity Tips for SMBs

When it comes to cybersecurity, small and medium-sized businesses (SMBs) face unique challenges. They are often targeted by cybercriminals, but have limited resources to invest in robust security measures. There are several simple steps that SMBs can take to improve their cybersecurity posture. Our goal in this blog post is to provide key cybersecurity tips for SMBs. Train your employees …

Protect Your Business: Cybersecurity Insurance Coverage Explained

Discover the importance of cybersecurity insurance coverage and learn about eligibility criteria and key considerations for protecting your business. Understanding Cybersecurity Insurance: What You Need to Know Cybersecurity insurance is a type of policy designed to protect businesses from financial losses and reputational damage caused by cyber threats and data breaches. It provides coverage for expenses related to data breaches, …

Common Cybersecurity Acronyms

Cybersecurity is a branch of technology that protects information that is stored digitally from online hackers, however, with such a vast subject, there is a plethora of unfamiliar words and acronyms that the everyday person would not know. As a company that knows A LOT about online security, we want to provide you with a few key acronyms and definitions …

Combatting Business Email Compromise Risks

An old scam that keeps reinventing itself with new victims. Don’t become one!  You’ve probably heard the classic business email compromise (BEC) scam about Nigerian princes who want to deposit money in people’s bank accounts—but first need their prey to send them money to make it all work to plan. It’s an oldie but goodie. Unfortunately, it’s also one that …

business email compromise timeline

Business E-Mail Compromise

Business E-Mail Compromise Since 2013, when the FBI began tracking an emerging financial cyber threat called business e-mail compromise (BEC), organized crime groups have targeted large and small companies and organizations in every U.S. state and more than 100 countries around the world—from non-profits and well-known corporations to churches and school systems. Losses are in the billions of dollars and …

Americans are losing billions due to internet crime

Tips to Shop Securely Online

Because we shop online for nearly everything for our businesses and personal lives, it’s essential to be vigilant about cyber-safety. Here are some tips to make sure you’re shopping securely. Only shop on sites using HTTPS in the URL as opposed to HTTP. If a site is using HTTP, password and payment data can easily be stolen by anyone who …

Cyber-Privacy Basics

Sound advice from our friends at The National Cybersecurity Alliance:    Personal Information is Like Money. Value it. Protect It. Your devices make it easy to connect to the world around you, but they can also pack a lot of info about you and your friends and family, such as your contacts, photos, videos, location and health and financial data. …

cookies

Cache & Cookies on Your Mobile Device

You’ve probably heard the term “cache” and “cookies” thrown around in relation to internet browsing. Did you know that this data is also stored on your mobile devices? Here we will discuss what they are, why you should clear them and how to do it. CACHE & COOKIES – WHAT ARE THEY? Cookies small snippets of data stored on your …

Digital Safety Tips

By now, we’re all a bit coronavirus weary–maybe even a bit anxious to find out how things are progressing as states and businesses begin to re-open. There are endless offerings of websites, apps, news stories, etc. to stay current. Now more than ever, it is critical to exercise caution in your consumption of news. There is a lot of malicious …

Remain Vigilant!

By now we’re all pretty savvy when it comes to recognizing a scam but remain vigilant! The “bad guys” are savvy too, particularly in the midst of this COVID 19 pandemic. Practice extra caution with calls from unrecognized phone numbers and “too good to be true”  or suspicious email offers. Especially links contained within those emails. Read these digital protection …

The 2020 State of Cybersecurity Networking Event

Farr Shepherd invited to speak at The State of Cybersecurity networking event hosted by Digital Resource. West Palm Beach, FL – 1/29/2020 – Farr Shepherd, President, Decypher Technologies presented The State of Cybersecurity 2020 in partnership with Jim King of Atlantic Pacific Insurance. The presentation was hosted by Digital Resource in West Palm Beach, FL. Farr’s speech covered 2 main …

Petya-Security-Alert

An Added Benefit For Our Managed Prevent Clients

An Added Benefit For Our Managed Prevent Clients Decypher has recently made a commitment to improving our processes in blocking unicode domain phishing. Unicode phishing uses emails and domains with characters that are so similar to the real thing that they can trick people into thinking the links are legitimate. Luckily, our email spam solution, Proofpoint, quarantines email from unicode domains …

Managed Services Team – Behind the Scenes

MANAGED SERVICES TEAM – BEHIND THE SCENES Our Managed Services offer a wealth of great benefits. Here’s a brief snapshot of what our technicians are up to on a daily basis to keep our Managed Service Clients’ technology running smoothly, safely and consistently: We monitor servers for functionality to prevent unexpected issues like a drive filling up causing bottlenecks in …

Browsing History, Key Commands and Passwords

BROWSING HISTORY, KEY COMMANDS AND PASSWORDS We want to keep you informed with the latest technology tips. Here are some that we’ve found most helpful this month. In Chrome or Firefox browsers, you can quickly find a recent page you visited by right-clicking on the back arrow to view a list of your browsing history. Or, in the event that …

Cybersecurity & Russia, iPhone Charging, and more…

Cybersecurity & Russia, iPhone Charging, and more… Keyboard on Windows If you tend to accidentally press keys on your keyboard (perhaps due to hand tremors), “Filter Keys” can be enabled on Windows to slow down the key response so mistyped or repeated keystrokes don’t register. This accessibility feature doesn’t seem to affect regular typing. Outlook Calendars You can merge calendar …

windows shortcuts

Memorable Passwords, Phishing, and Troubleshooting

Memorable Passwords, Phishing, and Troubleshooting When Troubleshooting, Don’t Overthink It If your computer is acting erratically, try basic troubleshooting first. This could include powering the machine down, then back up, closing windows and quitting programs. Also, don’t forget about external devices, as sometimes disconnecting these can resolve the issue. Try disconnecting the keyboard, mouse, track pad, etc. to see if …

email-encryption

Email Encryption, Send Limits, and Equipment Replacement

Email Encryption, Send Limits, and Equipment Replacement Equipment Replacement Often, sticker shock steers us to purchase cheaper solutions, but these decisions can come at a cost. That cost could be increased down time or more frequent service calls due to equipment failures. Replacement equipment should be of the same or higher quality than the item replaced. For example, Decypher would …

Important Security Update – Petya Cyberattack

What is Petya? This ransomware is a variant of an older attack, dubbed “Petya,” except this time the attack uses EternalBlue to target Windows systems—the same exploit behind the infamous WannaCry attack. While this variant appears to be an upgraded version of Petya, there is no confirmation that this attack is from the same author. It differs from typical ransomware …