News Feed Item

According to BIS Computer Solutions: Think of Hackers as Electronic Safecrackers Who Can Loot a Company’s Data in Seconds

CEOs and business owners can no longer feel secure with just alarm systems and guards at their offices and warehouses.

“Even small to midsize businesses face a growing threat from hackers-- electronic safecrackers who can slip into their data vault without making a sound and loot critical information in seconds,” warns Michael Macho, division president of BIS Computer Solutions of Los Angeles.

Hackers vary their attacks on companies and people. Currently, they are infecting computer systems with a software called CryptoWall Ransomware, a virus that sneaks in as an attachment and encrypts all data files so the user can’t open them. “Thieves then demand a ransom, holding a company’s computer system and its information hostage until it’s paid,” says Macho.

When corporate data is breached, it’s not just the company suffering the loss, he maintains. “The privacy and personal information of their customers, employees, stockholders, vendors—virtually everyone they do business with—are victims of the theft.”

The reputation of a company and its brand can be damaged as well, and any sized business is at risk, according to Macho.

10 Ways to Safeguard Company Data Against Hacker Attacks:


The global publicity triggered by the brazen heist of Target’s credit card customers at its 1,797 stores in the U.S. and on E-Bay’s multi-million name customer-base should make senior managers and owners aware of the fallout of a cyber-attack.

While digital attacks on Fortune 500 companies grab headlines and shrewd hackers will still target them, smaller, privately owned companies are vulnerable, said the BIS executive. “Why? Because they usually do not have database security programs, policies and products in place.”

Boss Must Understand Hacker Threat

There are data security solutions that cost between $3000 and $5000 and can be installed in a day, explains Macho. “But the boss must first understand his or her exposure and the consequences of a breach. It’s as critical as understanding the accuracy of their accounting systems.”

Protecting the corporate data does not disrupt a company’s operations. The first step is a site evaluation where an IT security consultant ‘walks’ through a company’s system looking for vulnerabilities, weak spots, viruses.

Based on their findings, explains Macho, the consultant recommends hardware and software needed to secure the system from penetration, viruses embedded by hackers and establishing a firewall. BIS often recommends the new Watchguard XTM 330 can be used as a ‘next generation firewall’ or as a ‘unified threat management’ device known as a network security appliance.

“Network security has never been more critical to the ability of organizations to operate successfully in today’s business environment where their vital information is constantly exposed to global hackers,” says Sandra Raygoza, Watchguard’s channel account manager for the Southwest.

With a network security appliance in place, the company’s software is either upgraded or, preferably, replaced with newer, more powerful protection. “Of all the anti-virus software programs on the market today, we usually recommend the new Malwarebytes Premium,” says Macho.

At $25 a year, it is economical but not 100% impenetrable, he notes. “No database security program can totally protect a company but it can dramatically reduce the risk of a hacking.”

About BIS Computer Solutions

Based in La Crescenta, a Los Angeles suburb, BIS Computer Solutions (www.biscomputer.com) creates customized software programs, applications and consulting to a variety of industries. A large emphasis of its operations are placed on security and infrastructure solutions, and protecting data.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Digital transformation is about embracing digital technologies into a company's culture to better connect with its customers, automate processes, create better tools, enter new markets, etc. Such a transformation requires continuous orchestration across teams and an environment based on open collaboration and daily experiments. In his session at 21st Cloud Expo, Alex Casalboni, Technical (Cloud) Evangelist at Cloud Academy, explored and discussed the most urgent unsolved challenges to achieve fu...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
DXWorldEXPO LLC announced today that ICOHOLDER named "Media Sponsor" of Miami Blockchain Event by FinTechEXPO. ICOHOLDER give you detailed information and help the community to invest in the trusty projects. Miami Blockchain Event by FinTechEXPO has opened its Call for Papers. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Miami Blockchain Event by FinTechEXPO also offers s...