Blog
Poison Attacks: A Quick Overview with Examples
Tis the season for cyberattacks. With more online shopping, prepping for new year’s resolutions, travel, and phone calls, attackers have more opportunities. Hacking, phishing, and ransomware get all the press because they usually result in big ramifications that are...
Keeping Your Data Safe: Access Control
We’re fully aware that sometimes we sound like a broken record. But as a Managed Services Provider with security as one of our chief responsibilities, it’s worth it to once again remind you that cyberattacks are everywhere these days. Malwares such as viruses, worms,...
How to Ensure You Have Strong Cybersecurity Policies
These days, all companies of all sizes are targeted and those who don’t proactively protect themselves are more often in the crosshairs. Creating strong cybersecurity policies for your company and best practice instructions for your staff are the key ways to prevent...
How to Avoid Potential Network Failures
For small businesses, an IT network failure can be devastating. Network failures are particularly challenging for any size organization, but for small businesses, it can be difficult (in bad cases, impossible) to recover because they don't have the resources of large...
How to Avoid Online Shopping Scams (both for business and privately)
‘Tis the season! Black Friday, stocking stuffers, that perfect item that you know someone will love—there are million and one reasons to start clicking for deals this time of year. But with all this opportunity to find a rare gem or save a buck, there are increased...
How to Protect Yourself Against Poison Attacks
Data poisoning can take a few approaches when attackers find a way to access your data. Logic corruption, data manipulation, and data injection are all ways that cybercriminals can lock down or render your network useless. In many cases, getting access back depends on...
What You Should Have in Your Backup and Disaster Recovery Plan
Think Quicker Recovery Time, Not Quicker Backup When it comes to backups, you want as much data as you can get, right? Wrong. While incremental backups are much faster than executing a full back up, they unfortunately prolong recovery time. In the event of data...
Who Does CMMC Apply to?
In 2020, the Department of Defense (DoD) sent shockwaves through the Defense Industrial Base (DIB) when it released the first version of the Cybersecurity Maturity Model Certification (CMMC). Now companies are left asking “Who does CMMC apply to and does it apply to...
What Is Cybersecurity Maturity Model Certification? CMMC Explained
The Cybersecurity Maturity Model Certification (CMMC) is both an assessment framework for US defense contractors and sub-contractors, and a certification program for organizations performing independent assessments. The purpose of the CMMC is to strengthen the...
Biggest Concerns if You Aren’t CMMC Compliant
The Cybersecurity Maturity Model Certification (CMMC) is currently undergoing a formal rulemaking process that can take up to 24 months to finish, but now is the time to start understanding the impacts if you aren’t CMMC compliant. This way you’ll have the runway you...
Mobile Device Management Questions Every Small Business Should Ask
Convenience is now a fact of everyday life. So much so that it’s taken for granted. That’s why employees are now insisting on using their personal mobile devices like smartphones and tablets for business purposes. Put these devices together with private and public...
Vulnerability Testing vs Penetration Testing
Being notified that "all of your confidential information is extremely vulnerable, we know this because..." is bad news, but whatever follows the ellipses determines just how bad. According to Security Magazine, 43% percent of small businesses are victims of...
How to Have Good Cyber Hygiene
Good hygiene is important not only in our personal routines, but also in our virtual lives. Just like we need to keep our teeth clean and gums sanitized regularly to avoid expensive and painful dental work, your data needs to be kept clean with regular checkups and...
IT Considerations When Hiring Seasonal Staff
For companies with seasonal spikes, like accounting firms at tax time or retail stores during Christmas, hiring a part-time, temporary workforce is a natural part of annual operations. While this works well for handling labor costs, it can pose some real challenges...
What to Consider Before Allowing Employees to Bring Their Own Devices (BYOD)
By this point, it’s common knowledge: “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces that allow personal devices are the new normal which means that a BYOD policy attracts new hires, and it also lifts employee morale and productivity. But this...
Why Employees Love Using Their Own Devices (BYOD)
Bring Your Own Device (BYOD) to work was just an idea a few years ago but it’s now becoming the norm. For most people (including those reading this article) using your personal smartphone, tablet, or laptop for work seems natural. The downside is that employees are...
How to Build a Small Business Cybersecurity Compliance Plan
In our digital business era, cybersecurity incidents are now a fact of doing business. No matter how small a business is, they all now face a myriad of threats that can seriously jeopardize their ability to remain operational. Which is why it’s so critical for small...
7 Tips for Creating (and Maintaining) a Great Small Business Privacy Policy
Please note that in no way is Help Desk Cavalry providing legal information or counseling in this article. The content below is offered for your information only and any concerns or questions about complying with current laws should be directed to a legal...
Cybersecurity Compliance Is Coming for Small Businesses
From time to time, businesses of all sizes face an unstoppable force of change. Sometimes, this force comes suddenly like an earthquake and reshapes the entire business landscape—just like the COVID-19 pandemic did in 2020. More commonly, however, the force begins as...
What Should a Small Business Privacy Policy Cover?
Please note that in no way is Help Desk Cavalry providing legal information or counseling in this article. The content below is offered for your information only and any concerns or questions about complying with current laws should be directed to a legal...
What Is a Small Business Privacy Policy and Why Do I Need One
Please note that in no way is Help Desk Cavalry providing legal information or counseling in this article. The content below is offered for your information only and any concerns or questions about complying with current laws should be directed to a legal...
5 Ways Small Businesses Can Save Money on Security
Small to medium-sized businesses and large enterprises may seem worlds apart, but they deal with many of the same cyber-security threats. That’s because in recent years, cybercriminals are increasingly targeting small businesses because they’re easy marks. It’s no...
Cybersecurity Compliance Can Be a Competitive Edge for Small Businesses
For small businesses, the most common competitive advantage is their proximity to customers, which allows them to deliver a more personalized customer service experience. But there’s another often-overlooked source of a competitive advantage that small businesses can...
Why You Should Care if Your Employee’s Personal Social Media Account Was Hacked
Personal social media accounts are one of the most common forums for cyberattacks. You may think cybercriminals would prefer to hack online banking accounts or shopping accounts, but that doesn’t seem to be the case. Social media accounts hold a lot of personal...