AllConnected Blog

CPA
Events
Brennan Smith

Safeguarding Taxpayer Data Webinar

The Safeguards Rule requires companies to develop a written information security plan that describes their program to protect customer information. Prepare with AllConnected’s Safeguarding Taxpayer Data Webinar…

Read More »
NCSAM October 2020 - Do Your Part, Be Cybersmart
National Preparedness Month
Brennan Smith

National Cybersecurity Awareness Month – October 2020

The National Cyber Security Alliance (NCSA) and the U.S. Department of Homeland Security (DHS) launched National Cybersecurity Awareness Month (NCSAM) in October 2004 as a broad effort to help all Americans stay safer and more secure online.

From 2009-2018, NCSAM’s theme was “Our Shared Responsibility,” the role we all have, as individuals or as organizational leaders, to secure the digital assets under our control.

Read More »
fire rescue
Disaster Recovery
Mariah Prendergast

DRaaS: Misconceptions of Data Backup and Data Recovery

There are many players in the data protection, backup and recovery space, many who claim to provide a “DRaaS” service, but not many provide for all aspects you should expect in a Disaster Recovery Solution.

AllConnected believes you should have the facts so you can make an informed decision.

Regardless of what business you run, your Disaster Recovery plan begins with backup.

Read More »
Multi-factor authentication: something you know, something you are, something you have
AllConnected News
Mariah Prendergast

How Secure Is Your Multi-Factor Authentication?

If today’s cybercriminal obtains your login credentials, he can change your account settings, steal sensitive personal or company data, send out phishing emails as you, and possibly access additional accounts within your organization.

Criminals can attempt this “malicious account takeover” through:

Hacking: Automated scripts run through various password combinations (AKA, brute force attack) to discover the correct access.
Phishing and Spear Phishing: Highly targeted emails from seemingly credible sources trick users into to revealing personal information.
Social Engineering: Researching online databases and social media to data mine potential password information based on your name, location, phone number, or names of family members, etc.
Botnets: Bots from multiple IP addresses perform high-volume username and password hacks to take over a number of accounts while staying unnoticed.
Credential Stuffing: Stolen or leaked credentials are tested against multiple websites in the hope that the victim uses the same password for everything.
In order to prevent the above, connecting to your network and critical applications has developed from a simple password into a process of multi-factor authentication (MFA).

Read More »