Security Tag - Kutztown, Pennsylvania | Lantek

    blog-img

    We aren’t shy in terms of talking about phishing, its dangers, and what can be done to prevent it. However, it can be too easy to focus directly on email phishing and exclude the many other forms that phishing can and often does take.

    Read More
    blog-img

    It’s more important than ever to know just how much your business currently spends (and should plan to spend) on cybersecurity, both of which can be addressed by understanding the goal of cybersecurity protections and how they affect your company’s defenses. Let’s consider how much you should spend on cybersecurity, as well as what protections that spending can afford.

    Read More
    blog-img

    Hackers and scammers are everywhere and are continuously littering your business with situations that could put its operations in jeopardy. One of the most hacked industries is healthcare, as hackers make a point at going after patient information. Let’s go through some of the reasons why hackers find health data so attractive. 

    Read More
    blog-img

    Cybersecurity is a complicated beast. Not only do you have to be sure that you’re protected from threats coming from outside your business, there are also a few very real threats that can originate from inside your business, too. Both are critical to prevent, which can be quite effectively accomplished via a zero trust approach to your security.

    Read More
    blog-img

    What happens when the tools designed to keep organizations safe from network breaches, are the victim of a cyberattack? After all, these tools are just applications, albeit sophisticated pieces of security software, they can run the risk of being exploited much in the same way any other software is. This is exactly what happened to cybersecurity giant Barracuda as it was the victim of a zero-day exploit. Let’s take a look at the hack and how you can protect your business from sharing the same fate.

    Read More
    blog-img

    A modern network, when properly configured and protected with modern cybersecurity tools, can be extremely secure. Since that’s been the trend for some organizations over the years, hackers have been looking for ways around the security many businesses have in place. If hackers can’t break in through normal means, they will turn to other, more insidious methods, like phishing attacks, to get what they are after.

    Read More
    blog-img

    Google is rolling out client-side encryption to Gmail and Calendar, which will allow users to create meeting events as well as send and receive emails that have been encrypted before being sent to Google servers. Client-side encryption will be available to organizations with Google Workspace Enterprise Plus, Education Standard, and Education Plus plans. All other types of Google Workspace accounts and personal Gmail accounts will not get client-side encryption.

    Read More
    blog-img

    The Federal Trade Commission has developed their Safeguards Rule for one purpose: To set up a guideline on how to interact, store, and use customer information. The FTC enacted the Rule in 2003, but it was heavily amended in 2021 to ensure that it keeps up with the technology used by businesses today. It outlines the policies and procedures that all covered companies need to enact.

    Read More
    blog-img

    Weak passwords are one of the leading causes of cybercrime, identity theft, and data breaches. Sure, it’s easy to say it, but this time we wanted to demonstrate just how easy it is to crack a wimpy password. 

    Read More
    blog-img

    For the growing business, doing the right things to secure your network and data is a constantly evolving situation. For larger businesses, they tend to approach the situation with a different perspective. They plan out the whole process. This is what is called enterprise security.  Let’s take a look at what enterprise security entails and how the little guy can benefit from doing things like larger companies do them. 

    Read More