Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.
May
04

Identity Theft Affects Email Marketing

By · Comments Comments Off on Identity Theft Affects Email Marketing

The economy, layoffs, fear and everything else that are making people nervous about the future has also lead to a rapid increase in small internet businesses popping up. With today’s  tools a person could potentially have a business up and running in hours. However…

Identity theft has raised the bar in blocking access to your new and existing customers using email marketing campaigns. In the past we may have found spam annoying as it filled up our in box, but with phishing, pharming, social media spying, etc.  all being used to steal one’s personal information, it’s gotten to the point of customers not opening, blocking and erasing all correspondences (legitimate or not). Hey, better safe than sorry.

All the so-called business cost savings that can be achieved using electronic media may be flying out the window. Aweber, Constant Contact, and others all have great products and these attacks are not their fault. Just realize that their identity has also been stolen: their brand. But as a business owner do you want to pay monthly service fees if all your marking efforts only end up in eTrash.

So, before starting a large, expensive email marketing campaign, determine if your customers will even read or click onto anything you send them. Maybe the new way to keep your customers informed is by creating a blog and posting your information and stories there. This strategy forces your customers to come to you and keeps them in control.

Comments Comments Off on Identity Theft Affects Email Marketing
May
03

Are You Protecting Your Data With a Screen Door?

By · Comments Comments Off on Are You Protecting Your Data With a Screen Door?

Well, you probably heard about the Educational Credit Management Corp (ECMC) data theft on March 21st of a media device that stored the student loan information of 3.3 million individuals. While this theft could be devastating to the individuals – depending on who stole the information and what they do with it – it is already a major expense for ECMC. Here are just a few costs they can expect:

• Bad press
• Government investigations and fines
• Credit monitoring services to the victims
• Law suits and legal services
• New security technologies and policies to implement
• And then, how productive will employees be with all these changes being implemented. Read More→

Categories : Uncategorized
Comments Comments Off on Are You Protecting Your Data With a Screen Door?
May
02

Technology Companies Must Incorporate Security Engineers

By · Comments Comments Off on Technology Companies Must Incorporate Security Engineers

All technology developing companies must incorporate security engineers before bringing new products to market. Anything less is just plain irresponsible and greedy. It pains me to criticize my fellow technology brethrens, but privacy theft has to be stopped. Read More→

Comments Comments Off on Technology Companies Must Incorporate Security Engineers
Apr
30

Amazon / Google Spam

By · Comments Comments Off on Amazon / Google Spam

But it looks like an Amazon ad. It’s Not!

Beware of a email that looks like an product selection or monthly deal from Amazon. There are many places to click to see pictures, unsubscribe, etc. It is spam to get access to your computer.

Businesses today are using more online shopping carts and online marketing services to inform customers about their products. As spammers start coping the look and feel of your emails then they cause everyone to erase anything that come electronically from any company. Legitimateor not. I can’t tell you how many deals I have been offered by companies simply because I don’t trust the email. And some of these deals were legit.

So if you do use auto-responders only use ones from reputable companies.

Individuals, if in doubt always check the links by hovering you mouse over it and reading the URLdata. If it does no look right, don’t click. If by chance you have, be sure you have a strong anti-virus program so block access and protect your computer and data.

Comments Comments Off on Amazon / Google Spam
Apr
20

The Cloud Goes Green, but is it Secure?

By · Comments Comments Off on The Cloud Goes Green, but is it Secure?

Recently I received an invite to a webinar discussing how companies are transforming their business by using more cloud-like infrastructure. The argument is that it saves the company’s enery and reduces their carbon footprint.

While I am not here to dispute these claims, I do warn any company that migrates to more cloud infrastructure to make security of the data paramount in their plan. Especially with the many state and federal privacy protection laws on the books. As been blogged about before, the average cost on a company from a data breach in 2009 was $6.7 million per incident. Read More→

Comments Comments Off on The Cloud Goes Green, but is it Secure?
FLEXCAP
SiteLock