Security/Compliane

data

How to Protect your On-Premises Databases from Security Vulnerabilities

Exploiting security flaws is one of the major tactics used by cybercriminals to attack organizations. Vulnerabilities are an unfortunate fact of life for operating systems, applications, hardware devices and da...

Screen Shot 2021-08-16 at 2.29.54 PM

Five Steps to Password Policy Compliance

Hackers are using weak and stolen credentials in a significant way to compromise business-critical environments. Stealing access to your environment using a known password for a user account is a much easi...

Capture

Cybersecurity assessments

Having a security assessment set up can offer peace of mind with technology. Cyber threats are hidden everywhere, by having a third party cybersecurity one can protect their data and other sensitive information...

Ransomware Attacked My Mom’s Computer

How My Mom Got Hacked, a real life story about Brooklyn artist who receives a panicked phone call from her mom one day complaining her personal computer has been taken over by some sort of strange encryption. T...

Who’s in Charge of Your Cybersecurity?

  The first step in successful cyber-security is getting every employee on board. It is pretty obvious that some hardware goes into creating a security shield around important data. As an Information Techn...

Two-Factor Authentication Evaluation Guide

Two-factor Authentication is a type of multi-factor authentication that provides identification of users using a combination of two different components. These components are often something the user knows, pos...

Cyber Security Threats – Proactive Rather Than Reactive

Security executives have increasingly urged firms to utilize prevention, encouraging a plan that encompasses Information Technology and business units in order to ensure cyber security. Why might you ask? As a ...

Anti-Virus Protection For XP Users| BVA INC. emPowering Your IT

Now that Microsoft has stopped supporting Windows XP, this marks the end of security patches. If you are still using Windows XP this leaves your computer vulnerable to various viruses. According to this article...

Aruba Cost Effective Dual Band Wifi Processor – Affordably Boost Mobile Performance | BVA INC. emPowering Your IT

If you work in a moderately dense wifi area and need a device that can boost your mobile performance without interference from cellular networks, then the dual-radio AP-103H is the product for you. This dual-ba...

Antivirus Failing

According to the Microsoft Security Intelligence Report apparently not all PC users that have anti-virus actually get protected for malicious viruses 100% of the time. There is a great article that a team membe...