Blog

The technology blog for Inland Empire and Southern California professionals, who want the most out of their business IT solutions

Chapter 5: How do DDoS attacks affect businesses and how can you stop them?

A distributed denial-of-service (DDoS) attack can take down an organization’s website — and even big brands are not safe from it. In December 2015, the BBC suffered one of the biggest DDoS attacks yet. The incident, which lasted more than three hours, caused the BBC’s website to display error messages and some of its pages […]

Read more

Chapter 2: Types of malware attacks and how to recognize them

Internet appliance maker SonicWall reported 10.52 billion malware attacks in 2018, a sharp rise from the 8.62 billion recorded in 2017. For you to effectively protect your company from this threat, you must first be familiar with the different types of malware and the dangers they pose.

Read more

PSA: Disaster Planning for your Business and Home

This time of year in Southern California reminds us of the importance of planning for disasters. The recent wildfires this last week have devastated homes and affected thousands of others with planned and unplanned power outages. I’d like to share some thoughts with you to help you prepare both professionally and personally for these types […]

Read more

Introduction to cybersecurity: Types of cyberthreats you need to know

Cybercrime is now one of the fastest-growing crimes, beating the global illegal drug trade in terms of profitability. Estimates indicate that it will cost the world $6 trillion annually by 2021, a huge increase from $3 trillion back in 2015. Businesses of all sizes are vulnerable to the threat — in fact, 43% of cyberattacks […]

Read more

Chapter 1: Five types of phishing attack that can harm your business

When the European Union issued the General Data Protection Regulation in 2018, companies sent their customers emails regarding their updated privacy policy. Hackers took this as an opportunity to send out a phishing attack disguised as an email from wildly successful hospitality brokerage Airbnb.

Read more

Chapter 8: Protecting your data with a phishing test

A 2018 report blamed phishing for 48% of all data breaches, most of which occurred during the last three months of the year. With breaches costing companies millions of dollars annually, it’s crucial that you protect your organization from phishing. One of the best ways to do this is to conduct a phishing test.

Read more

Event Recap: Inland Empire Cyber Security Summit 2019

Zeta Sky recently hosted a Cyber Security Summit as part of it’s commitment to National Cybersecurity Awareness Month (NCSAM), held annually in October. Below is a recap of some of the highlights and key takeaways from the event. FBI Special Agent Caitlin Gremminger delivered a powerful briefing to local business professionals Cyber crimes are increasing, […]

Read more

Chapter 5: Implementing MFA in your business

In what is considered to be one of the biggest data breaches of all time, a staggering 21 million unique passwords were discovered in an online hacking forum in January 2019. Dubbed as “Collection #1” by security researcher Troy Hunt, the breach proved even more that password authentication alone is no longer as secure as […]

Read more

Chapter 4: Password management tips for small businesses

One of the greatest mistakes small business owners can make is thinking no one is interested in their business’s data. In truth, small- and medium-sized businesses (SMBs) are among the most prone to cyberattacks, with 67 percent of SMBs experiencing an attack and 58 percent suffering from a data breach in the last 12 months, […]

Read more