Security/Compliane

Capture

Cybersecurity assessments

Having a security assessment set up can offer peace of mind with technology. Cyber threats are hidden everywhere, by having a third party cybersecurity one can protect their data and other sensitive information...

Ransomware Attacked My Mom’s Computer

How My Mom Got Hacked, a real life story about Brooklyn artist who receives a panicked phone call from her mom one day complaining her personal computer has been taken over by some sort of strange encryption. T...

Who’s in Charge of Your Cybersecurity?

  The first step in successful cyber-security is getting every employee on board. It is pretty obvious that some hardware goes into creating a security shield around important data. As an Information Techn...

Two-Factor Authentication Evaluation Guide

Two-factor Authentication is a type of multi-factor authentication that provides identification of users using a combination of two different components. These components are often something the user knows, pos...

Cyber Security Threats – Proactive Rather Than Reactive

Security executives have increasingly urged firms to utilize prevention, encouraging a plan that encompasses Information Technology and business units in order to ensure cyber security. Why might you ask? As a ...

Anti-Virus Protection For XP Users| BVA INC. emPowering Your IT

Now that Microsoft has stopped supporting Windows XP, this marks the end of security patches. If you are still using Windows XP this leaves your computer vulnerable to various viruses. According to this article...

Aruba Cost Effective Dual Band Wifi Processor – Affordably Boost Mobile Performance | BVA INC. emPowering Your IT

If you work in a moderately dense wifi area and need a device that can boost your mobile performance without interference from cellular networks, then the dual-radio AP-103H is the product for you. This dual-ba...

Antivirus Failing

According to the Microsoft Security Intelligence Report apparently not all PC users that have anti-virus actually get protected for malicious viruses 100% of the time. There is a great article that a team membe...

How Secure is your Dropbox?

On April 15th, Tech Republic ran an article of interest to those of you dealing with network security. Blogger Michael Kassner’s article “Dropsmack: Using Dropbox to steal files and deliver malware” detailed hi...

First Twitter, now Facebook & Apple

It was just a couple of weeks ago that BVA wrote about Twitter being the latest victim of a sophisticated hacking scheme. This last week proved to be testing for some of the biggest names out there, Facebook an...