Call Us (860) 577-8060

Security Archives - Sound Computers | Westbrook, CT

blog-img

It seems like another cyber attack occurs or a new form of malware emerges every day. Cybersecurity Ventures expects global cybercrime costs to grow by 15% per year over the next five years and reach $10.5 trillion by 2025. This leads us to the need for cyber insurance.

Cyber insurance can help your business with recovery in the event of a cyber attack. It is important to note that it can’t prevent cyber incidents. However, it can help with financial recovery.

Read More
blog-img


It is a scary thought. The analyst firm Gartner 
predicts that a whopping 99% of cloud security breaches will be the customer’s fault by 2025. This means that cloud providers (like Amazon, Microsoft and Slack) are doing an excellent job at keeping their platforms secure but their clients (businesses across the globe) are failing. 

Read More
blog-img

Privileged account management (PAM) is a useful way for companies to ensure that users with excess access privileges are using their accounts appropriately and securely. PAM is also a valuable means to ensure that privileged accounts have not been compromised by external cyber-attackers.

Read More
blog-img


You might have heard of ransomware and malware but "Bossware" might be a new term for you. Don't panic. Bossware isn't a new type of cybercrime. It is actually a tool that your business can use to monitor employee productivity.

Read More
blog-img

One of the big findings in the Sophos 2021 Threat Report was that the lack of attention to basic cybersecurity best practices is at the heart of many of the most damaging attacks that companies saw last year. 

Read More
blog-img

It seems like every time you turn around there is a new major cybersecurity risk in the news headlines. Earlier this year, we had back-to-back ransomware attacks at Colonial Pipeline and global meat producer, JBS. Recently, there was a major vulnerability found in software that runs medical devices.

Read More
blog-img

Company employee cybersecurity awareness training often focuses on identifying phishing attacks and avoiding falling for malicious links and attachments. Phishing is the main driver of all types of cyberattacks and continues to grow as its delivery is optimized by large criminal groups.

Read More
blog-img

The healthcare sector uses technology and IoT devices all day and every day. From the tablets that allow doctors and nurses to make notes on the go to patient monitors sending signals wirelessly to the nurses’ station, healthcare IT has become vital in most medical facilities.

Read More
blog-img

Phishing seems like it has been around since the beginning of email itself. Scammers have used the medium to send lies and threats to users in an attempt to get them to do something. 

Read More
blog-img

How to Keep Your Network Safe During the Holiday Online Shopping Frenzy

The holiday shopping frenzy has already begun as people try to get out ahead of a supply chain crunch. This means that employees in Connecticut and throughout the country will be on their phones and computers buying gifts while on a company network and/or device.

Read More