At Makios, we believe you can’t talk about having experience without providing examples. Our team of expert IT and security consultants understands the importance of letting success speak for itself. With a roster full of happy clients covering a wide range of markets and industries, it’s hard to pick our favorites. Instead, we’ve decided to highlight … » Learn More about Case Study: Healthcare Provider
If you are wondering if you are affected by the #VPNFilter hack check the latest list of devices that were affected, we went from 15 to more than 80 devices: Asus Devices: RT-AC66U (new), RT-N10 (new), RT-N10E (new), RT-N10U (new), RT-N56U (new), RT-N66U (new), D-Link Devices:, DES-1210-08P (new), DIR-300 (new), DIR-300A (new), DSR-250N (new), DSR-500N … » Learn More about A reboot isn’t enough to kill VPNFilter
Many companies have adopted a BYOD (bring your own device) environment, either to save money on hardware or to maximize convenience among their employees. However, BYOD environments represent significant potential risks, because phones, tablets, and laptops often provide a direct link for malware to enter your company’s network. Remote workers who access your company’s network … » Learn More about Protecting Your Employees’ Mobile Devices
While computers and the internet have made many aspects of business and commerce easier, technology advances have not been entirely beneficial. Data breaches and catastrophic data loss are a painful reality for too many companies of all sizes. In many ways, passwords to email and other private or proprietary files and programs represent the weak link … » Learn More about Importance of Password Protection
Everyone has a certain level of risk tolerance. What’s yours? One way to determine the answer is to ask yourself what the cost would be if your business were disrupted or completely shut down even for a single day. Or an even more dire scenario: what if your company experienced an intellectual property data breach, … » Learn More about Define Your Risk Tolerance
Before cybercriminals can wreak havoc on your computer system, they have to get past your security. By leveraging some basic safety strategies, you can protect your business from a cyber-attack. We’d like to share with you our Cyber Security Cheat Sheet. Consider this your security hygiene routine, like brushing your teeth. With regular checkups and daily accountability, … » Learn More about Cyber Security Cheat Sheet
Sometimes it can feel like nobody’s safe from a cyber-attack. With large corporations like Target and Staples succumbing to breaches and ransomware, what can a small business owner do to make sure sensitive data and critical computer networks are protected? According to Symantec, the average cost of a cyber-attack on a small to medium sized … » Learn More about Do You Have Layered Protection?
Cyber attacks begin with infiltration. Without access to your network, most hackers would fall well short of their goals, be it stealing sensitive data or holding files hostage. Unfortunately, even the strongest security protocols are no match for the careless or uneducated user. Phishing entices individuals to click on links or open attachments armed with malware. For small businesses, … » Learn More about A Phishing Expedition
Pay or Play Crypto viruses work by locking all your files and documents with a password. The decryption key provided after paying the ransom frees the data and allows you to access your information. Once the hackers deploy the encryption virus, retrieval options are limited. You can submit to the ransom demands and receive the … » Learn More about Crypto Viruses – Are You Safe?
When it comes to cybersecurity, we all understand the threat, but awareness is not enough. We need to safeguard against them. But hacking concerns and computer error problems can seem overwhelming and we often ignore them. It’s human nature to procrastinate, and we know it will be expensive to have someone help with this. Every … » Learn More about Dealing with Technical Problems in a Practical Way
Hackers Never Sleep Earlier this year, an international ransomware attack incapacitated England’s National Healthcare System (NHS) while also disrupting operations at several private and public agencies in countries across the globe. Christened WannaCry, the ransomware attack ultimately infected over 400,000 machines by exploiting a well-known vulnerability in the Windows 7 operating system. While only … » Learn More about Malicious Malware – Fact or Fiction?
From government agencies to international corporations and small businesses, these days it seems everyone’s data is under attack. In fact, according to the Identity Theft Resources Center, 2016 signified a high-water mark for data breaches, with 1,093 documented cases representing an increase of almost 40% over previous years. Both the healthcare industry and the small … » Learn More about Are You an Easy Target?