Blog
Data Safe Group LLC »
Check out our blogs to stay up to date with the latest trends in the IT world and insights on keeping your company’s data safe and secure.
What is Ryuk Ransomware and How Does it Work?
Ryuk is a type of ransomware that once deployed encrypts files on an infected system. Ransom is typically demanded in bitcoin or other types of cryptocurrency. Ryuk has targeted many large organizations using Microsoft Windows and related systems. First spotted in...
When Is It Time To Update Your Software?
>It’s that little alert on your desktop. The “upgrades available” indicator when you check your computer. Or when your smartphone tells you that it’s going to update later while you’re sleeping, and you defer it to another time. What if you miss an email or a text?...
Why Are We Normalizing Breaches?
Back in August of 2019, Facebook was the victim of a data breach that compromised information from 533 million people from 106 different countries. Why is this news now? Because the breach was addressed in a recent email from Facebook management, and that email was...
Cryptocurrency 101
Cryptocurrency is a term that we hear all of the time, but many of us don’t seem to fully grasp what it is, and how it works. We’ll take a look at it from a high level to provide some understanding. Why? Well, it isn’t going away, and it only seems to be gaining...
7 Steps To Improve Your Data Security and Data Compliance
Data privacy continues to be a hot topic in the business world. With every new technology come new regulations that require companies to completely re-examine the way they handle private data. Most companies already have a basic data privacy policy they constructed...
The Hacker Got Hacked
WeLeakInfo was a data breach site that offered paid subscriptions to users who could then access their searchable database which contained stolen records. This now defunct site contained 12.5 BILLION records of data that was illegally obtained through various means....
Why is Employee Cybersecurity Training Important?
We believe transforming your weakest links into your strongest defenses is one of the strongest cyber resilience strategies. Here's an in depth look at our EVA program. To schedule...
How to identify fraudulent checks
At this time of year, we all risk resembling Charlie Brown waiting on his Valentine in the mailbox. Has my check arrived? Is it in the mailbox? Perhaps you’re waiting on stimulus checks or tax refunds. But along with the hint of spring flowers, there is mailbox...
What is the Dark Web?
Due to its anonymity, cybercriminals use the dark web as a place to buy and sell stolen information. Most stolen personal information will end up here. How do I know if my business is...
Unemployment Scams: Best Practices
We tend to not ask too many questions and let things slide when we aren’t certain about the situation. Is that normal? Should that happen like that? I guess so. I don’t really know. I mean, it seems ok?? And as with all things related to COVID-19, there’s an air of...
Build Your Local Network with Strategic Technology Partners
If you're a New Jersey commercial realtor, you might already know these five attributes that prospective clients look for before deciding to work with you: experience, local expertise, marketing skills, accessibility, and a strong network. Looking at the last...
One Ring Phone Scams: How to Prevent Them
Your phone rings once. The number looks familiar, same area code, same exchange as your local area, so you pick it up. Hello? No one responds on the other end of the line. You repeat “hello?” and it feels like a bad connection or that they can’t hear you on the other...
How We Can Help Secure Moving Company’s Customer Relationships and Acquisitions
Successful local businesses are built on relationships and being able to thrive in today’s marketplace requires that you establish and maintain a strong professional network. As a commercial moving company, being able to provide value to your customers beyond the...
Technology becomes critical: PPP loans to cover technology needs for business owners
As businesses increased cloud reliance to support remote work last year, IT departments reassessed budget allocations. For small businesses, a PPP loan could help clean up and streamline software infrastructure. In the cloud, more usage means higher costs. Poised to...
Cybersecurity Checklist: Best Practices for Real Estate Professionals
Cybercrime can be devastating to real estate professionals and their clients. The following is a quick checklist that offers some best practices to help real estate professionals curb the risk of cybercrime. 1. Email and Password Hygiene Never click on unknown...
How to Secure Data When Moving Offices
Commercial moves present many different challenges, from the logistics of physically moving furniture and equipment to making sure that time spent moving has as little effect on operational business time as possible. One of the biggest services that kept our team busy...
Debunking BCDR Myths: Backup is ‘Good Enough’
Here at Data Safe Group we know that data backup, business continuity and disaster recovery (BCDR) are foundational offerings for small and medium businesses. It's critical that we share that backup alone is no longer enough to protect business-critical data. Business...
5 Ways to Improve Your Businesses Data Protection
With data collection and use present in almost every facet of our lives, including the obvious platforms like social media and online shopping, and the less obvious, like exercise equipment and kitchen appliances, our personal data has never been more accessible or...
Worried You’ll Be Blamed for Data Breaches at Work?
Avast found that almost 40% of small business employees think that a staff member who unknowingly clicks a malicious link would be held personally responsible for a data breach, which could be encouraging employees to keep quiet rather than flagging a potential...
How to Evaluate Your Home Office Security
We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our permanent setup, or at the very least, a long term one that we need to move forward with and in confidence. These recommendations are for those who...
How to Manage Cyber Risk in 2021
As 2020 comes to a close, we look back on another year of increased attacks on small and medium business clients, and the ecosystem of tools used within the community. In the face of these events, the IT provider community showed the desire to tackle the underlying...