Blog
How to Protect Yourself Against Poison Attacks
Data poisoning can take a few approaches when attackers find a way to access your data. Logic corruption, data manipulation, and data injection are all ways that cybercriminals can lock down or render your network useless. In many cases, getting access back depends on...
What You Should Have in Your Backup and Disaster Recovery Plan
Think Quicker Recovery Time, Not Quicker Backup When it comes to backups, you want as much data as you can get, right? Wrong. While incremental backups are much faster than executing a full back up, they unfortunately prolong recovery time. In the event of data...
Who Does CMMC Apply to?
In 2020, the Department of Defense (DoD) sent shockwaves through the Defense Industrial Base (DIB) when it released the first version of the Cybersecurity Maturity Model Certification (CMMC). Now companies are left asking “Who does CMMC apply to and does it apply to...
What Is Cybersecurity Maturity Model Certification? CMMC Explained
The Cybersecurity Maturity Model Certification (CMMC) is both an assessment framework for US defense contractors and sub-contractors, and a certification program for organizations performing independent assessments. The purpose of the CMMC is to strengthen the...
Biggest Concerns if You Aren’t CMMC Compliant
The Cybersecurity Maturity Model Certification (CMMC) is currently undergoing a formal rulemaking process that can take up to 24 months to finish, but now is the time to start understanding the impacts if you aren’t CMMC compliant. This way you’ll have the runway you...
Mobile Device Management Questions Every Small Business Should Ask
Convenience is now a fact of everyday life. So much so that it’s taken for granted. That’s why employees are now insisting on using their personal mobile devices like smartphones and tablets for business purposes. Put these devices together with private and public...
Vulnerability Testing vs Penetration Testing
Being notified that "all of your confidential information is extremely vulnerable, we know this because..." is bad news, but whatever follows the ellipses determines just how bad. According to Security Magazine, 43% percent of small businesses are victims of...
How to Have Good Cyber Hygiene
Good hygiene is important not only in our personal routines, but also in our virtual lives. Just like we need to keep our teeth clean and gums sanitized regularly to avoid expensive and painful dental work, your data needs to be kept clean with regular checkups and...
IT Considerations When Hiring Seasonal Staff
For companies with seasonal spikes, like accounting firms at tax time or retail stores during Christmas, hiring a part-time, temporary workforce is a natural part of annual operations. While this works well for handling labor costs, it can pose some real challenges...
What to Consider Before Allowing Employees to Bring Their Own Devices (BYOD)
By this point, it’s common knowledge: “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces that allow personal devices are the new normal which means that a BYOD policy attracts new hires, and it also lifts employee morale and productivity. But this...
Why Employees Love Using Their Own Devices (BYOD)
Bring Your Own Device (BYOD) to work was just an idea a few years ago but it’s now becoming the norm. For most people (including those reading this article) using your personal smartphone, tablet, or laptop for work seems natural. The downside is that employees are...
How to Build a Small Business Cybersecurity Compliance Plan
In our digital business era, cybersecurity incidents are now a fact of doing business. No matter how small a business is, they all now face a myriad of threats that can seriously jeopardize their ability to remain operational. Which is why it’s so critical for small...
7 Tips for Creating (and Maintaining) a Great Small Business Privacy Policy
Please note that in no way is Help Desk Cavalry providing legal information or counseling in this article. The content below is offered for your information only and any concerns or questions about complying with current laws should be directed to a legal...
Cybersecurity Compliance Is Coming for Small Businesses
From time to time, businesses of all sizes face an unstoppable force of change. Sometimes, this force comes suddenly like an earthquake and reshapes the entire business landscape—just like the COVID-19 pandemic did in 2020. More commonly, however, the force begins as...
What Should a Small Business Privacy Policy Cover?
Please note that in no way is Help Desk Cavalry providing legal information or counseling in this article. The content below is offered for your information only and any concerns or questions about complying with current laws should be directed to a legal...
What Is a Small Business Privacy Policy and Why Do I Need One
Please note that in no way is Help Desk Cavalry providing legal information or counseling in this article. The content below is offered for your information only and any concerns or questions about complying with current laws should be directed to a legal...
5 Ways Small Businesses Can Save Money on Security
Small to medium-sized businesses and large enterprises may seem worlds apart, but they deal with many of the same cyber-security threats. That’s because in recent years, cybercriminals are increasingly targeting small businesses because they’re easy marks. It’s no...
Cybersecurity Compliance Can Be a Competitive Edge for Small Businesses
For small businesses, the most common competitive advantage is their proximity to customers, which allows them to deliver a more personalized customer service experience. But there’s another often-overlooked source of a competitive advantage that small businesses can...
Why You Should Care if Your Employee’s Personal Social Media Account Was Hacked
Personal social media accounts are one of the most common forums for cyberattacks. You may think cybercriminals would prefer to hack online banking accounts or shopping accounts, but that doesn’t seem to be the case. Social media accounts hold a lot of personal...
Multi-Factor Authentication (MFA or 2FA) 101
There’s a very good chance that you’re already using multi-factor authentication somewhere in your virtual life. That’s because it’s one of the fastest, cheapest, and most universal way for companies and manufacturers to enforce safety protocols for those logging into...
Top Cybersecurity Compliance Considerations for Small Businesses in 2022
Cybersecurity compliance is like a puzzle. To see the big picture for your company, you must place all of the pieces in the right place. The problem is that it’s not immediately obvious how many pieces there are. Unfortunately, regulations aren’t delivered to small...
The Ultimate IT Checklist for Evolving Small Businesses
Many small businesses begin with simple basics: a plan for administration, sales, technology, customer service, and maybe some marketing. Of all of these, technology is quickest to change while also carrying the highest risk. As companies grow, though, they often...
Small Businesses Outside of California Can’t Afford to Ignore the California Consumer Privacy Act (CCPA)
Please note that in no way is Help Desk Cavalry providing legal information or counseling in this article. The content below is offered for your information only and any concerns or questions about complying with current laws should be directed to a legal...
VPN 101: Remote Access and Safety
For many of us, working outside the office walls is now “business as usual”. One of the many upsides to this is that technology is now catching up—and getting more competitive—with the tools needed to optimize working remotely. The advantage is in this is that there...