Your Sales & Marketing Staff’s Role in Cyber Security
Sales and marketing staff are often the most public facing employees in a business, and they play an important role in protecting the cyber security of a small business. Sales and marketing staff help to establish your business brand and the trust of customers. Since...
Finance & Administration’s Role in Cyber Security
Finance professionals are often charged with planning, budgeting, accounting and purchasing. Over the course of their work, they use and create budgets, financial performance reports, tax filings, compensation and benefits information, accounts payable data, accounts...
Cybersecurity Leadership Starts at The Top
In this age of cybercrime, your employees are the biggest risk to data or financial loss. To foster a culture where your employees do their part to keep your business secure from security threats, the business owner needs to lead the way. Leadership involvement is...
Your Employees: Your Biggest Asset in the Fight Against Cybercrime
Most small business owners believe they are too small to be a target for cybercriminals, but statistics show otherwise. According to a recent report by Verizon, 61% of data breach victims are small businesses. While it’s crucial to put some security programs in...
6 Crucial Things to Include in Your BYOD Policy
If you are planning on implementing a BYOD (bring your own device) program for your small business in California, here are a few key components that you may want to consider defining and including in your policy. 1. Maintain the Right to Remotely Delete Data If an...
Managing & Reducing the Security Risks of a Small Business BYOD Program
A BYOD (bring your own device) program will significantly increase the risk of your business’s data being compromised, as well as your business falling victim to cyber crime. It will also increase the many types of hardware and operating systems connected to your...
Is a BYOD Program Right for Your Small Business?
BYOD (bring your own device) programs allow employees to use their personal devices for work to access company data and applications, such as corporate email, calendars and contacts. Personal devices include smartphones, tablets, and laptops. BYOD is not a new trend...
Stop Your Employees from Being Your Weakest Link
Even if you have every single security measure in place, your employees can leave your organization vulnerable, whether they realize it or not. The strongest backup disaster recovery devices, antivirus software, and firewalls will not do anything if an employee falls...
Be Wary of These Six Ways That Ransomware May Enter Your Business
Ransomware is malicious software that will encrypt data then hold it for ransom, hence the name. Cybercriminals make you pay in order to gain access to your data again. This is a way that hackers can extort money from you and other hard-working business owners. The...
Every Business Should Follow These Wireless Security Policies
Advances in wireless technology have dramatically changed how we utilize the internet. Now, we can access the internet from nearly anywhere and via a long list of devices, from smartphones and tablets to even automobiles. The caveat that comes with this greater...
Business Owners Should Be Aware of These 4 Types of Social Engineering Attacks
Social engineering attacks can put your company at risk. Although they frequently involve the use of email, there are several varieties that do not require emails. An example is a “misplaced flash drive.” In this type of attack, the hacker will “accidentally” leave a...
8 Tips to Keep Your Employees’ Cellphones Secure Within the Workplace
Employees carry out a lot of tasks on their mobile phones, which is why it is imperative to ensure the phones remain secure in the workplace and even outside of it. Fortunately, there are ways that you can implement a cellphone security policy so that private...
StillPoint Systems
Glendale, CA
818 528 5600
info@stillpointsystems.com
BUSINESS HOURS