Call Us (860) 577-8060

Security Archives - Sound Computers | Westbrook, CT

blog-img

What Should You Do If Your Work Laptop is Lost or Stolen? (Every Second Counts!)


Having your laptop stolen is unpleasant because you need to replace an expensive piece of hardware which risks your digital security. Fortunately, you can take precautions before and after your laptop goes missing.

Read More
blog-img



Stolen login credentials are a hot commodity on the Dark Web. There are prices every type of online account from banking to social media. For example, hacked social media accounts will go for between $30 to $80 each.

Read More
blog-img

How to Improve Remote Team Security Using a Guest Network for IoT

How do you secure your company network when your employees work remotely and the rest of your team is transitioning to remote work? The days of cramped desks across a crowded office building are over for many businesses.

Read More
blog-img

What's a Reply-Chain Phishing Attack?

Companies had to deal with more than just COVID complications last year as they faced brutal cyber-attacks. In fact, a new type of phishing attack was discovered after the furniture giant IKEA noticed several malicious reply-chain emails making rounds in the company. While IKEA was able to protect itself against the attack, many companies are still unaware of the lurking danger. 

Read More
blog-img

Why You Should Probably Train Employees on Cybersecurity More Often


Cyber security training is growing in importance. Imagine if your company was
compromised and every employee's financial and personal data was leaked. Can you imagine the consequences? Will your clients or stakeholders still have confidence in your business if that happens?

Read More
blog-img

Watch Out For Ransomware In The Cloud!
Last year, the REvil cybercrime gang ruined the Independence Day Holiday for hundreds of American businesses after successfully launching a ransomware attack. The attack forced hundreds of companies to close temporarily. REvil demanded a ransom of $70 million to unlock their files.

This attack isnt a one-off. Ransomware is a growing threat to businesses across America. Research shows that cybercriminals launch roughly 4,000 ransomware attacks per day and that number is set to increase with the rise of ransomware-as-a-service. 

Read More
blog-img

The Top Social Engineering Tactics Cybercriminals Are Using Right Now

Social engineering refers to a broad spectrum of cyber attacks in which a malicious actor uses psychological manipulation to trick people into sharing sensitive details or clicking on a malicious link. 

Read More
blog-img

4 Top Mobile Device Attacks

The mobile workforce has come into its own over the last 18 months. After COVID-19 forced organizations to rethink their workplace operations, remote and mobile working quickly became a part of day-to-day business. It’s a trend that is set to skyrocket in the coming years. The International Data Corporation (IDC) believes that by 2024, 60% of the US workforce will be considered mobile workers. 

Read More
blog-img

RPO vs RTO: What's the Difference & Why Are Both Important To Know?


Every company needs to have a data backup and disaster recovery plan in place in this data-first world. Disaster recovery refers to a program used to regain access to data, systems and IT services after an unintended outage. Backup is often a critical part of the recovery process.

Read More
blog-img

Many small and medium-sized business owners (SMBs) think that supply chain attacks won't happen. While SMBs might not be the initial target of a supply chain attack, they can easily get caught up in the crossfire and become collateral damage.

Read More