Data Net Blog

Data Net Blog

Data Net has been serving the California area since 1983, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Turns Out Paying Ransomware Hackers Is a Bad Idea After All

Turns Out Paying Ransomware Hackers Is a Bad Idea After All

Ransomware has taken over the security industry, as we are sure you have seen from the endless headlines associated with it. All business owners must remain cognizant of the dangers that ransomware represents. A new study has found that organizations infected by ransomware that wind up paying the ransom are not necessarily better off--in fact, paying the ransom could have disastrous consequences.

0 Comments
Continue reading

McDonald’s Data Breach Is the Latest In a Disturbing Cyberattack Trend

McDonald’s Data Breach Is the Latest In a Disturbing Cyberattack Trend

Major cyberattacks seem a dime a dozen these days, especially with businesses that might not seem like possible targets. For example, McDonald’s restaurants recently suffered a data breach. Let’s take a look at the situation, how it played out, and what we can learn from it.

0 Comments
Continue reading

Phishing Attacks in 2021 Trend Toward the COVID-19 Pandemic

Phishing Attacks in 2021 Trend Toward the COVID-19 Pandemic

Hackers have made some nefarious choices over the past several months, many of which involve using the COVID-19 pandemic to spread their influence and steal data through the use of phishing attacks. Let’s explore how these cybercriminals have leveraged a global disaster to their benefit and some ways that you can keep your business secure.

0 Comments
Continue reading

Privacy Engineering Holds the Key to Future Data Privacy Decisions

Privacy Engineering Holds the Key to Future Data Privacy Decisions

Data privacy is central to most conversations in the business environment, and in a time when ransomware and hacks of all kinds are constantly receiving media presence, it’s no surprise that it is sensationalized to a certain extent. That said, it’s critical for businesses to understand what needs to be done to future-proof their data privacy infrastructures.

0 Comments
Continue reading

Tip of the Week: How to Engage Your Team in Security Training

Tip of the Week: How to Engage Your Team in Security Training

When it comes to your business’ security, your team members can either be your greatest vulnerability or your greatest strength. In order to ensure that the latter is the case, you need to make sure that they are all trained up in the proper security measures. For your convenience, we wanted to share a few tips to help make this training more effective.

0 Comments
Continue reading

These New Password Best Practices from the NIST Are Not What You Think

These New Password Best Practices from the NIST Are Not What You Think

When a hacker tries to access one of your accounts, the first challenge they must overcome is the password. This is why industry professionals always encourage you to create them with security in mind. The latest guidelines issued by the National Institute of Standards and Technology, or NIST, are not quite conventional or traditional, but they do give valuable insights into how to create more secure passwords.

0 Comments
Continue reading

Ransomware Attack on Colonial Pipeline Leads to Gas Crisis in the American Southeast

Ransomware Attack on Colonial Pipeline Leads to Gas Crisis in the American Southeast

Ransomware attacks are nothing new, but when was the last time they made headlines by instigating a gas crisis? A Russia-backed hacking collective called DarkSide targeted Colonial Pipeline, a company responsible for almost 45 percent of the fuel for the Southeastern United States, with a devastating ransomware attack. The attack led to a spike in fuel prices and spotty availability while also showing cracks in the nation’s energy infrastructure, and it has even sparked a renewed interest in cybersecurity.

0 Comments
Continue reading

Updating Your Software Protects Your Business

Updating Your Software Protects Your Business

Software is a critical part of your business. Without it, you would have to do everything manually. In fact, most businesses couldn’t do what they do without their software. That’s why it is so surprising that many businesses don’t actively patch their software. Let’s take a look at our patch management service and why it’s such a huge benefit. 

0 Comments
Continue reading

Cyberattacks are Happening Faster Than Businesses Can Detect and Prevent Them

Cyberattacks are Happening Faster Than Businesses Can Detect and Prevent Them

Cyberattacks are spending less time on their victims’ networks before they are discovered, which sounds like good news, but the reality isn’t so straightforward. Let’s take a few moments and dig into the situation at hand, and what it means for your cybersecurity.

0 Comments
Continue reading

Could Your Business Soon Be Threatened By Freelance Hackers?

Could Your Business Soon Be Threatened By Freelance Hackers?

We’ve all seen advertisements for the websites that offer to connect you with the professionals ready to help you with a specialized task around your home, from repair work to childcare to cleaning services. Unfortunately, cybercriminals have adopted a similar tactic to help market their services, leading to the creation of a sort of hackers’ gig economy on the Dark Web.

0 Comments
Continue reading

Dark Web Gig Work is a Blooming Threat… Are You Protecting Your Business?

Dark Web Gig Work is a Blooming Threat… Are You Protecting Your Business?

It’s a bit of a nightmare scenario for a business, born of watching too many crime thrillers: a criminal syndicate hacks into their systems, wreaking havoc and stealing all their data, while also destroying that company’s reputation. Is this scenario a fantasy? To a point, yes—but not so much as you might think.

0 Comments
Continue reading

What Threat is a Small Business Really Under?

What Threat is a Small Business Really Under?

Small businesses face a lot of risks, one obvious one being the threat of potential cybercrime and how its influence can impact their businesses. Let’s consider how these influences have taken shape, and the challenges that small and medium-sized businesses must now face as a result.

0 Comments
Continue reading

Healthcare IT Had a Rough Time in 2020

Healthcare IT Had a Rough Time in 2020

2020 offered no shortage of challenges for healthcare providers. Besides the obvious issues that COVID-19 posed to the operations, finances, and supply chains that these organizations rely on, cybersecurity issues have played a significant role. Let’s go over some of the security stresses that healthcare providers have been experiencing.

0 Comments
Continue reading

Will Google Revolutionize Internet Privacy?

Will Google Revolutionize Internet Privacy?

Your privacy on the Internet matters, even if you don’t think you have anything to hide. Over the last few years, this has become more and more evident as we watch tech giants profit off of understanding the people who use their services. Facebook, Amazon, and Google are among them. Google in particular has made some recent policy changes that are worth understanding.

0 Comments
Continue reading

The Right Practices Will Get Employees Thinking About Their Own Security

The Right Practices Will Get Employees Thinking About Their Own Security

People look at their work differently, just as they view their lives differently. The many different perspectives of your staff brings a bit of variance of how they view data security. This isn’t so good for your business as you need to trust them to prioritize the security of your data and infrastructure. Let’s take a look at some of the best practices that you should be training your staff in, which will allow them to protect your data better, and theirs. 

0 Comments
Continue reading

How Can the Zoombombing Issue be Solved?

How Can the Zoombombing Issue be Solved?

Conferencing has played a crucial role for businesses, and never more than in the past year. Unfortunately, this has presented the opportunity for trolls to join in these remote collaboration efforts, interrupting them with inflammatory and vulgar content. Labelled “Zoombombing”, these attacks have led to the implementation of numerous privacy protections and countermeasures… but the question remains: how effectively do these protections defend a business’ efforts?

As a study has revealed, not effectively enough.

0 Comments
Continue reading

Best Practices for Keeping Your Passwords Secure, Yet Memorable

Best Practices for Keeping Your Passwords Secure, Yet Memorable

As the preeminent form of security online, passwords are currently the most important frontline defense to get right in your organization. However, many people often cut corners with their passwords to ensure they don’t forget them, recycling them across their many accounts. Let’s go over a few ways to help your team create secure passwords that they can commit to memory without shortchanging their efficacy.

0 Comments
Continue reading

Why Software Patches Can’t Be Back-Burnered

Why Software Patches Can’t Be Back-Burnered

Your software is an important, even crucial, part of your business’ security considerations. After all, a software title with security issues could be the access point that hackers and scammers need. This is precisely why software updates and security patches are so important to keep up on. Let’s consider this in a little more detail.

0 Comments
Continue reading

How to Resolve the Most Prevalent Security Threat to Your Business

How to Resolve the Most Prevalent Security Threat to Your Business

If I were to ask you what you believed was the biggest potential threat to your business’ future, what would your answer be? The correct answer for most is the risk that an employee might let in a threat—intentionally or not. Let’s investigate how this might happen, and what you need to do to stop it.

0 Comments
Continue reading

Cybersecurity Lessons to be Learned From a Spotify Hack

Cybersecurity Lessons to be Learned From a Spotify Hack

We will often keep an eye on current events to find practical examples to use as evidence in support of our recommended best practices, but a relatively recent Spotify hack has given us a special opportunity. We now have the opportunity to use this one story to reinforce not one, but two such practices. Let’s dive in, shall we?

0 Comments
Continue reading

Network Audit

Our network audit will reveal hidden problems, security vulnerabilities, and other issues lurking on your network.

Sign Up Today!

News & Updates

Artificial intelligence has become one of the most talked-about technologies throughout every sector of society. It’s being widely used in business, education, and civic life. We want to focus on the latter element and discuss how the U.S. Department...

Contact Us

Learn more about what Data Net can do for your business.

Data Net
2445 5th Avenue Suite 200
San Diego, California 92101