data security

What is spear phishing and how can my company avoid it?

The average person receives 16 malicious emails per month. A 2018 study of 500,000,000 emails found one out of every 101 emails received were malicious. Are your employees properly educated about this? Or will they click a link that could cost the company millions? Most of the time, the greatest risk to your company’s internet security are the people who work for it (including you). One click on a malicious email—even one that looks like it comes from a friend—could seriously damage your company. New employees are the most at risk for being duped. [1] What is Spear Phishing?  Spear phishing is an attack in which hackers trick targeted users into sharing confidential information. It can also involve tricking the [...]

Red Letter IT Newsletter – June 2018

There's nothing like jumping right into a summer heat wave!  With sunblock, beaches, parks, and vacations, let's take a look at these 5 quick but important IT stories you should know about: MICROSOFT 365 BUSINESS - BETTER WORKFLOWS & PROCESSES: Detroit Wallpaper Engaged with Red Level to Implement Powerful Tools to Consolidate and Simplify Everything from Finanical Data to Sales Presentations "I would say that we have probably reclaimed at least 10–15 percent of our budget by preventing waste through timely collaboration." (Andi Kubacki, Co-Founder, Detroit Wallpaper) TECH NEWS: Save Money & Time in Your Journey to The Cloud Learn how reserve instances, automation, auto shut down features, and more can give you smart strategies for better security, performance, and cost savings. [...]

Red Level’s Ed Baustert Attains Two Advanced Security Certifications = Better Security For You

“The threat landscape is always changing, and changing at a very rapid rate” For most companies, information security is a significant area of concern these days – and it ought to be. Hardly a week goes by without news of a new high-profile hack, data theft or intrusion striking a major enterprise, causing incredible damage to reputations and bottom lines. Meanwhile, the countless smaller companies being compromised, often with devastating results, seldom come to broader attention. The era of complacency about a network and data security is well beyond over: The abundance of sophisticated malware and the seeming freedom of powerful hacking groups has seen to that. Red Level believes that being anything less than high alert concerning security threats [...]

Six Big Challenges – or Opportunities – for CIOs and CEOs

A CIO’s work, it seems, is never done. For that matter, neither is the worry associated with most of it. It’s a big job, and one that seems to get bigger just about every day: New technologies, new security threats, new business challenges, and new opportunities alike conspire to consume more of our attention and more hours of our waking lives (and at worst, keeping us up at night and intruding on sleep time as well). […]

STEAK AND SECURITY: Make Sure That Security Is Always “Well Done”

Whatever you happen to be doing, it is usually a good idea to be doing it right. That involves following the basic steps needed to successfully get from the starting line to success – steps that have usually been discovered and developed by the legions who have gone before you who have tried things out, learned from their mistakes, tried again and succeeded. Take cooking a steak as an example. There are some things you always do, and some things you definitely don’t do – say, put frosting on it, or let the dog play with it. And there are some things you MAY do – if you really know what you’re doing. The things you MAY do usually don’t [...]