Welcome!

News Feed Item

According to BIS Computer Solutions: Think of Hackers as Electronic Safecrackers Who Can Loot a Company’s Data in Seconds

CEOs and business owners can no longer feel secure with just alarm systems and guards at their offices and warehouses.

“Even small to midsize businesses face a growing threat from hackers-- electronic safecrackers who can slip into their data vault without making a sound and loot critical information in seconds,” warns Michael Macho, division president of BIS Computer Solutions of Los Angeles.

Hackers vary their attacks on companies and people. Currently, they are infecting computer systems with a software called CryptoWall Ransomware, a virus that sneaks in as an attachment and encrypts all data files so the user can’t open them. “Thieves then demand a ransom, holding a company’s computer system and its information hostage until it’s paid,” says Macho.

When corporate data is breached, it’s not just the company suffering the loss, he maintains. “The privacy and personal information of their customers, employees, stockholders, vendors—virtually everyone they do business with—are victims of the theft.”

The reputation of a company and its brand can be damaged as well, and any sized business is at risk, according to Macho.

10 Ways to Safeguard Company Data Against Hacker Attacks:

(www.biscomputer.com/security-top-ten)

The global publicity triggered by the brazen heist of Target’s credit card customers at its 1,797 stores in the U.S. and on E-Bay’s multi-million name customer-base should make senior managers and owners aware of the fallout of a cyber-attack.

While digital attacks on Fortune 500 companies grab headlines and shrewd hackers will still target them, smaller, privately owned companies are vulnerable, said the BIS executive. “Why? Because they usually do not have database security programs, policies and products in place.”

Boss Must Understand Hacker Threat

There are data security solutions that cost between $3000 and $5000 and can be installed in a day, explains Macho. “But the boss must first understand his or her exposure and the consequences of a breach. It’s as critical as understanding the accuracy of their accounting systems.”

Protecting the corporate data does not disrupt a company’s operations. The first step is a site evaluation where an IT security consultant ‘walks’ through a company’s system looking for vulnerabilities, weak spots, viruses.

Based on their findings, explains Macho, the consultant recommends hardware and software needed to secure the system from penetration, viruses embedded by hackers and establishing a firewall. BIS often recommends the new Watchguard XTM 330 can be used as a ‘next generation firewall’ or as a ‘unified threat management’ device known as a network security appliance.

“Network security has never been more critical to the ability of organizations to operate successfully in today’s business environment where their vital information is constantly exposed to global hackers,” says Sandra Raygoza, Watchguard’s channel account manager for the Southwest.

With a network security appliance in place, the company’s software is either upgraded or, preferably, replaced with newer, more powerful protection. “Of all the anti-virus software programs on the market today, we usually recommend the new Malwarebytes Premium,” says Macho.

At $25 a year, it is economical but not 100% impenetrable, he notes. “No database security program can totally protect a company but it can dramatically reduce the risk of a hacking.”

About BIS Computer Solutions

Based in La Crescenta, a Los Angeles suburb, BIS Computer Solutions (www.biscomputer.com) creates customized software programs, applications and consulting to a variety of industries. A large emphasis of its operations are placed on security and infrastructure solutions, and protecting data.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
CIOs and those charged with running IT Operations are challenged to deliver secure, audited, and reliable compute environments for the applications and data for the business. Behind the scenes these tasks are often accomplished by following onerous time-consuming processes and often the management of these environments and processes will be outsourced to multiple IT service providers. In addition, the division of work is often siloed into traditional "towers" that are not well integrated for cro...
Father business cycles and digital consumers are forcing enterprises to respond faster to customer needs and competitive demands. Successful integration of DevOps and Agile development will be key for business success in today’s digital economy. In his session at DevOps Summit, Pradeep Prabhu, Co-Founder & CEO of Cloudmunch, covered the critical practices that enterprises should consider to seamlessly integrate Agile and DevOps processes, barriers to implementing this in the enterprise, and pr...
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection.
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, will discuss the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filte...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
SYS-CON Events announced today that VAI, a leading ERP software provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. VAI (Vormittag Associates, Inc.) is a leading independent mid-market ERP software developer renowned for its flexible solutions and ability to automate critical business functions for the distribution, manufacturing, specialty retail and service sectors. An IBM Premier Business Part...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
SYS-CON Events announced today that Catchpoint Systems, Inc., a provider of innovative web and infrastructure monitoring solutions, has been named “Silver Sponsor” of SYS-CON's DevOps Summit at 18th Cloud Expo New York, which will take place June 7-9, 2016, at the Javits Center in New York City, NY. Catchpoint is a leading Digital Performance Analytics company that provides unparalleled insight into customer-critical services to help consistently deliver an amazing customer experience. Designed...
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
The principles behind DevOps are not new - for decades people have been automating system administration and decreasing the time to deploy apps and perform other management tasks. However, only recently did we see the tools and the will necessary to share the benefits and power of automation with a wider circle of people. In his session at DevOps Summit, Bernard Sanders, Chief Technology Officer at CloudBolt Software, explored the latest tools including Puppet, Chef, Docker, and CMPs needed to...
In most cases, it is convenient to have some human interaction with a web (micro-)service, no matter how small it is. A traditional approach would be to create an HTTP interface, where user requests will be dispatched and HTML/CSS pages must be served. This approach is indeed very traditional for a web site, but not really convenient for a web service, which is not intended to be good looking, 24x7 up and running and UX-optimized. Instead, talking to a web service in a chat-bot mode would be muc...
SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...