BITS Blog 2017-07-05T08:00:17+00:00

BITS Blog

North Carolina Experiences Huge Jump in Data Breach in 2017

To say that 2017 was a bad year for cyber security is an understatement. Security breaches were national news this year, with vulnerabilities at Equifax and Uber leading the evening news. And North Carolina businesses were not immune to the problem. In North Carolina, the Theft Protection Act of 2005 requires that businesses report any [...]

By | February 6th, 2018|Categories: BITS News|Tags: |0 Comments

Crypto Currency: Ransomware & Your Vulnerability

Crypto mining is not against the law, nor is it a nefarious activity. At least not most of the time. But in order to fully understand why crypto mining can be a problem, we need to start from the beginning. Our story starts with the creation of a crypto currency called “Bitcoin”.  Like Paypal, Bitcoin [...]

By | December 8th, 2017|Categories: IT Services|Tags: , , , |0 Comments

Review Your Web Hosting Options: Dedicated, Shared or Cloud

With cloud services becoming more and more popular, this seems like a good time to review the options available to us. Perhaps, by comparing the advantages and disadvantages of the three most common computing solutions, you’ll get a better idea of the service or option that can best suit your business. Do I need dedicated [...]

By | November 14th, 2017|Categories: Hosting Services|0 Comments

What can we learn about cyber-security from Equifax?

If you haven't heard the particulars on the Equifax debacle, let me fill you in. There is a lesson to be learned for every business or institution possessing sensitive information. You may remember that the credit agency had a very serious hack in May or June of 2017. This hack affected over 143 million Americans [...]

By | October 12th, 2017|Categories: BITS News|Tags: , |0 Comments

Is Hacktivism a Problem for Your Business?

Back in the 80’s, when someone hacked a website, they left a message not unlike graffiti. “Hackers rule” or something silly like that. It was relatively harmless. These days, hackers have grown up and hack with resolve. If they should deem your website or business counter to their beliefs, you could find yourself out of [...]

By | September 17th, 2017|Categories: IT Services|Tags: , , , |0 Comments

Do Your Employees Hide Cybersecurity Incidents?

While advanced hackers may use malware, they often start by attempting to exploit the easiest point of entry. This typically includes phishing emails similar to the Google Docs email link that had Google on its toes recently. If your employees leave events such as this unreported, the consequences could be devastating to your cybersecurity. With [...]

By | September 6th, 2017|Categories: IT Services|Tags: , , , |0 Comments
Load More Posts