SolutionOne Blog

SolutionOne has been serving the North Texas area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Who’s Really Hurt the Most by Card Skimmers?

Who’s Really Hurt the Most by Card Skimmers?

It probably isn’t a question you’ve put much thought to, but tell me: who do you think feels the greatest impact from card skimming schemes, where a payment card’s data is captured so a cybercriminal can make use of the card’s associated account? While it isn’t a good situation for anyone, some are impacted more than others.

0 Comments
Continue reading

What Exactly is Personally Identifiable Information?

What Exactly is Personally Identifiable Information?

It’s incredibly important to keep your personally identifiable information secure, but what exactly constitutes PII? Today we offer a definition and suggestions or strategies to help you keep your PII safe.

0 Comments
Continue reading

Microsoft Warns Against Password Spraying

Microsoft Warns Against Password Spraying

As time has passed, cybersecurity attacks have become another way some organizations and nations engage in warfare. You can argue that there is a war going on at all times in cyberspace while hackers—many of which are sponsored by government agencies—try to outdo security researchers at all turns. One such scenario sees customers in the United States and Israeli defense technology sectors becoming the target of “password spraying.”

0 Comments
Continue reading

Yes, You Can Outsource Hacking

Yes, You Can Outsource Hacking

Have you ever wondered what it takes to hire a hacker to perform a specific task? Thanks to the findings of Comparitech, we can get a look into the average pricings of various hacking services that can be found on the Dark Web. While we would never condone ever taking advantage of such services, it’s a fascinating look into the business of cybercrime, and one that can give you an idea of just how easy and accessible it is for hackers to make your life difficult.

0 Comments
Continue reading

Privacy Engineering is the Key to a More Secure Future

Privacy Engineering is the Key to a More Secure Future

Data privacy is a bit of a hot topic in today’s business environment, especially with high-profile hacks and ransomware attacks emerging and putting organizations at risk. In particular, the emerging concept of “privacy engineering” has a lot of businesses thinking about how they can secure their organization and future-proof their data privacy infrastructures.

0 Comments
Continue reading

Do Google’s New Policies on User Data Privacy Indicate Larger Changes?

Do Google’s New Policies on User Data Privacy Indicate Larger Changes?

Just in case you haven’t been paying attention, online privacy has been highlighted significantly in recent years—in no small part due to the sale of our profiles by the tech giants that provide today’s most (in)famous websites… including and especially Google. Having said this, it is also important to acknowledge that some of Google’s recent policy changes could suggest that this may change at some point.

0 Comments
Continue reading

Conduct a Security and Compliance Audit, You Won’t Regret It

Conduct a Security and Compliance Audit, You Won’t Regret It

If you are an avid reader of our blog, we are constantly saying how there are always a growing number of threats. This is true. Two-in-every-three business owners consider that their cybersecurity risks are increasing each year. The other third must not focus on them, and that is a problem. In fact, many business owners don’t give the proper respect to cyberthreats and many of those businesses pay the price. This is why every business should consider a security and compliance audit a mandatory part of their yearly IT assessment. 

0 Comments
Continue reading

Is Security Being Sacrificed for the Sake of Convenience?

Is Security Being Sacrificed for the Sake of Convenience?

While this time of year is always huge for online retail, there is likely to be a much larger number of people turning to the Internet for their holiday purchases than usual… and, it would seem, a larger number of people taking security into consideration as they do so. Let’s examine how consumers are taking their data into their own hands and what this means for your business.

0 Comments
Continue reading

How to Beat Cybercrime and Stay Secure

How to Beat Cybercrime and Stay Secure

Unfortunately, it is hard for the modern business to keep all of their data secure. There are just so many threats that most businesses leak data without even knowing it. There are things you can do, however. Today we will go through four considerations that can help you stay ahead of cybercriminals. 

0 Comments
Continue reading

Cybercrime Spiking During the Pandemic

Cybercrime Spiking During the Pandemic

Keeping your network and infrastructure free from threats is always a priority, but with so many people working remotely businesses have encountered problems doing so. In fact, hackers, known for their opportunism, have been ultra-opportunistic during this period and it is causing many headaches for network administrators. Let’s take a look at some statistics that are definitely concerning as we head into the fall, where many experts expect the virus to become more problematic. 

0 Comments
Continue reading

Do Your Privacy Practices Line Up With Your Privacy Expectations?

Do Your Privacy Practices Line Up With Your Privacy Expectations?

How concerned are you about your data privacy, as a consumer, particularly when you entrust it to another business? If you answered “very”, you aren’t alone… 87 percent of Americans consider their data privacy to be a human right. Having said that, most don’t pay near enough attention to their own security precautions. Let’s take a few moments and examine this trend.

0 Comments
Continue reading

Don’t Get Phished Out of Your Stimulus Payment

Don’t Get Phished Out of Your Stimulus Payment

Wherever there is money, there are scammers. So it may not be a big surprise that scammers are out en masse trying to get between you and your federally mandated stimulus money.  It’s bad enough that we’ve already seen a couple of phishing scams using the COVID-19 pandemic that are designed to help hackers get into accounts they have no business in, now that these scammers know that people are getting cash, the scams are kicked up a notch.

0 Comments
Continue reading

Control Your Profile, Part III

Control Your Profile, Part III

Social media - we can’t live with it, but we really can’t seem to live without it. People who frequently read our blog will notice how often we discuss Facebook, one of the biggest players in the social media space. Seeing as privacy is one of the biggest concerns today, we’re wrapping up our short series on Facebook by reviewing the settings you might not have realized were options on your Facebook profile.

0 Comments
Continue reading

Control Your Profile, Part II

Control Your Profile, Part II

In part one of this series we started to go through Facebook privacy failings, but we didn’t really give you any information you can use. For part two, we have decided to take you through some security setting for Facebook. 

Facebook has over two billion users, and as a result, it has its fair share of privacy snafus. While they do (finally) make available all of a person’s Facebook information, their strategies to success are important reasons why there are so many privacy concerns throughout the online world. 

0 Comments
Continue reading

Control Your Profile, Part I

Control Your Profile, Part I

If you use Facebook, you’re not alone. There are over two billion active users on the platform. Whether you are willing to accept it or not, Facebook is a huge part of a good chunk of the world’s lives. If being a well-connected, with the times, user has always described who you are, then we could have some helpful information oriented towards you in our blog today. We will be discussing your online identity, and who you have told Facebook you are. 

0 Comments
Continue reading

When It Comes to Payment Cards, Frank Abagnale Gives Credit Where Credit is Due

When It Comes to Payment Cards, Frank Abagnale Gives Credit Where Credit is Due

With more than $16 billion being scammed from more than 16 million people, there is clearly an issue at hand that could use some expert insight. Those who are familiar with Steven Spielberg’s Catch Me If You Can might know that the movie was based on the memoirs of Frank Abagnale, former con man and longtime security consultant of the FBI. With his 45 years of experience with the bureau, Abagnale can safely by considered an expert in cybersecurity and fraud protection.

0 Comments
Continue reading

European Union’s GDPR: One Year Later

European Union’s GDPR: One Year Later

2018 will be remembered as the year where data privacy was altered forever. From Facebook’s many problems to the launch of the European Union’s General Data Protection Regulation, data privacy has never been a bigger issue than it is today. Let’s take a look at how the GDPR has affected the computing world in 2018-19 and how the past year’s events have created new considerations in individual data privacy.

0 Comments
Continue reading

Google Knows Where You Are: Here’s How to Stop Them

Google Knows Where You Are: Here’s How to Stop Them

Late in the summer this past year there were several articles written about how Google would continue to track the location of a person’s smartphone after they had chosen to turn their location settings off. A Princeton researcher corroborated those claims for the Associated Press, traveling through New York and New Jersey with locations services off only to be tracked the entire way. Today, we will discuss this issue, and tell you what you need to know to keep Google from tracking you wherever you go.

0 Comments
Continue reading

Smaller Practices are Choosing Cloud-Based EHR

Smaller Practices are Choosing Cloud-Based EHR

The medical field has spawned all kinds of new technology that takes patient care to the next level. Regulations demand that even smaller practices need to make the jump to electronic medical record systems (also known as electronic health records). These EMR/EHR solutions provide an interface that give providers and patients a way to keep themselves connected to each other--a tool to promote a more efficient delivery method for these services. We’ll take a look at these EMR and EHR solutions that are hosted in the cloud, giving your organization more information to make an educated choice on implementing this software.

0 Comments
Continue reading

Monitoring Pros and Cons

b2ap3_thumbnail_monitoring_400.jpgDealing with other people, whether in the office or a home environment, can often be troublesome. There is always a case of someone trying to be better than someone else, or trying to take advantage of their naiveté. There are solutions out there that make it easier than ever to help keep your home and business safe. Here are some of the best out there.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive