Cyber Security

Scam Protection - Red Flags

Scam Protection: 4 Red Flags That Indicate a Scam

By Josh Ihler / September 22, 2022

There are many different ways that cyber criminals will try to scam you. But the most common scam tactics share similar traits, whether they come in the form of emails, voice messages or calls, or even showing up to your house. Scam protection for yourself and your business includes being able to spot the red…

Read More
Cloud Security - 365 Shared Responsibility Model

Cloud Security Is On You: The Microsoft 365 Shared Responsibility Model

By The SWAT Bot / September 22, 2022

More and more businesses are using cloud services like Microsoft 365 (MS 365). But many don’t realize that the burden of securing their cloud is on their shoulders. It’s called the shared responsibility model. Here is what it means for your business, along with a free checklist you can download to improve your cloud security.…

Read More
Phishing Scam Prevention - Preventing Phishing

9 Ways to Protect Yourself Against Phishing

By Josh Ihler / September 15, 2022

Phishing is a type of scam where a cyber criminal sends a phony email in an attempt to get you to give information or click on a dangerous link that could download malware onto your device. Because phishing has been going on for decades, you would think we would have a surefire way to prevent…

Read More
Cyber Security Testing

Types of Cyber Security Testing (and Which Ones You Really Need)

By Josh Ihler / August 4, 2022

Cybercrime is an epidemic of huge proportions. 2020 saw an increase of 600 percent in cybercrime and 2021 estimates show ransomware attacks cost companies more than $6 trillion! Along with this came a rise in cyber security testing services and promotions. But do you really need all those services? Which type of testing should you…

Read More
Microsoft 365 Defender

Microsoft 365 Defender Settings Boost Cyber Security

By Josh Ihler / July 28, 2022

Want to put an end to phishing attacks? Get Microsoft 365 Defender. It can and will dramatically mitigate this risk with several of its features. Phishing attacks are the most common cause of  cyber security breach. They not only cost you money, they expose sensitive data and are therefore a severe threat to your business.…

Read More
Ransomware Response Checklist 2022 SWAT

What to do When Hit with a Ransomware Attack: Get The Checklist

By Jason Hagens / June 30, 2022

As a managed IT and cyber security provider, SWAT Systems regularly trains teams in what to do during a ransomware attack and, just as importantly, how to prevent them. Ransomware is just what it’s name implies: the criminal will demand payment and may also threaten to corrupt all your data/publish it, block it or use some…

Read More
File Sharing Risks and Best Practices

File Sharing Risks (and the Best and Worst Practices)

By The SWAT Bot / April 28, 2022

File sharing, whether it’s a photo, email or text, has become a necessary part of business. But some file sharing methods can be downright dangerous, leading to identity theft or other cyber security risks. Here at SWAT, we have noticed that many small and medium size businesses don’t have a strong policy and procedure about…

Read More
Russia Cyber Attack Warning

FBI Alerts Businesses of Potential Russian Cyber Attacks

By The SWAT Bot / March 30, 2022

The invasion of Ukraine by Russia has caused many European nations along with the U.S. government to issue sanctions to isolate Russia; cutting off their economy and natural gas market from the West in an attempt to cause tension between the Kremlin and Russian Oligarchs. Are you protected from the predicted threat of ransomware attacks?…

Read More
What Happened in the Washington DOL Breach

Major Data Breach for Washington Business Owners and Professionals

By The SWAT Bot / March 17, 2022

The data of 650,000 former and current Washington business owners and professionals was leaked after the Washington DOL Breach, the latest Washington state breach. We want SWAT clients to be aware of the impact it may have on their business, plus know how to react if you are a victim. What Happened In the Washington…

Read More
Endpoint Detection and Respoonse (EDR)

Next Gen Antivirus Protection: Why You Need Endpoint Detection and Response (EDR) to Protect Your Business

By Josh Ihler / January 27, 2022

Cyber criminals are constantly trying to access your network, steal your data or disrupt your business. If your antivirus software involves Endpoint Protection (EPP) alone, it is simply not enough in the fight to prevent a cyber attack. For true cyber security,  you need next generation antivirus: Endpoint Detection and Response (EDR). Why Traditional Antivirus…

Read More