3 Ways to Secure Your Corporate Network in 2017

It’s pretty safe to say that 2016 was a rough-and-tumble year for a number of industries, and the number, size, and scope of cyber security breaches was off the charts. These include two huge data attacks against Yahoo! users, as well as smaller breaches of sensitive data from the FBI and the IRS, among many others. Even the United States Presidential Election is rumored to have been tampered with by hackers.

stockvault-fuzzy-virtual-padlocks-on-screen208205-768x512So what does this mean for business owners, medical clinics, and law firms that need to protect both their own private data and the data of their customers, patients, and clients? It means that 2017 needs to be the year of network security. Let’s take a look at the best ways to make that happen.

Check out the three ways to secure your network over on the Avalon blog…

 

Keep Your Friends Close and Your W-2s Closer, Beware of Tax Identity Theft

If Melissa McCarthy was behind every identity theft, it might not be so terrifying. Unfortunately, that is likely not the case (although, it has not been confirmed).

melissa-mccarthyIdentity thieves are getting more sophisticated by the day. They used to steal your credit card number to buy a video game and grab a slice at the food court, but now they’re stealing identities to file tax returns and collect refunds.

The IRS has certainly improved its defense against phony refund requests—last year, as of March 5, 2016, the IRS identified 42,148 fraudulent tax returns involving identity theft, and identified 20,224 prisoner tax returns for screening, with $227 million claimed in fraudulent funds.[1] But these are simply the cases the agency is aware of, and there are likely many more. The IRS continues to expand its efforts to detect tax refund fraud.

Read more about fraudulent tax returns over on the Avalon blog…

 

Avalon and DIGITS Successfully Complete an Extensive Information Audit

pressrelease

Buffalo, NY (October 4, 2016)— Avalon Document Services and DIGITS LLC (a division of Avalon) have successfully completed the Shared Assessments Program Standardized Information Gathering and Agreed Upon Procedures (SIG AUP). The SIG AUP is an audit used by organizations to evaluate their information security program, which is inclusive of data protection, privacy, and business resiliency from IT failure. Avalon/DIGITS retained and independent CPA firm to complete the audit, which consisted of the evaluation of policies, procedures, and controls for the purpose of alignment with current regulations, industry standards, guidelines, and information security best practices.

To read more about this audit, continue to the Avalon blog…

Common Causes of a Network Breach

real_pie_chart

Nothing illustrates root causes of data breaches (among other things) quite like a nice pie chart. The Ponemon Institute’s 2016 study showed that malicious or criminal attacks still contribute to half of the pie, while negligent employees and system glitches share the other half.

The three top ways the 50% get to your sensitive data is insecure passwords, outdated software, and careless downloading.

Read more about the most common network breach vulnerabilities over on the Avalon blog…

E-mail Security: A Growing Concern

emailcs

If my inbox had a bouncer, I would make sure it kept out the “work from home”s and the “financial freedom”s that continue to find their way into my e-mail — and my heart. I’d like to think I’m not the only one still falling for these e-mail subject buzzwords, but I know you’re all smarter than that.

The recent major security breach that caused e-mail leaks from top Democratic National Committee (DNC) officials is increasing concerns associated with e-mail security. WikiLeaks released almost 20,000 confidential e-mails of the DNC’s staff members. Following this revelation, businesses need to ask “are we the the next target?”

To continue reading this article, please continue to the Avalon blog here…

Dropbox Dropped the Ball

You probably have enough managers in your life—your boss, your boss’s boss, your kids, your spouse, your dog—but we suggest you seriously consider getting just one more: a password manager.

password-866979_1920The good news is you don’t have to fetch coffee for or even talk to this manager. A password manager is a software application that stores and organizes your passwords, typically in an encrypted state. You create a complex, creative master password and use it to unlock and gain access to your entire password database. And if you get lazy, most password managers have the ability to generate, and subsequently store, unique complex passwords as needed.

Continue reading the full article on Avalon’s website: Dropbox Dropped the Ball 

Life’s a Breach

Written By: Mike McCartney, President of DIGITS, LLC – A Division of Avalon

stockvault-cyber-security-concept-open-and-closed-locks176755-768x540Typically, we consider ourselves pretty serious nerds when it comes to computers. But, we have to admit, cyber attackers are a challenge even for us. They hack into other people’s secure information, and they’re good at it. So it’s important to protect yourself and your company from these cyber assailants.

Many large, internationally known corporations—Target, eBay, Stubhub, and many others—have become victim to such attacks. But small, unknown companies are suffering as well. No one is immune to this alarmingly increasing trend.

Continue reading the full article on Avalon’s website: Life’s a Breach