Contact Us Today! (215) 853-2266

Bardissi Enterprises Blog

Bardissi Enterprises has been serving the Hatfield area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Don’t Want to Get Caught in the Middle of a Hacking War [VIDEO]

b2ap3_thumbnail_hacker_wars_400.jpgWhen you see the results of a major hacking campaign on the news, you might tend to sympathize with the victim. While most hacks target individuals or high-profile businesses, hackers have, for the first time, intentionally targeted each other. The attack in question occurred between Naikon, a cyberespionage group, and another group called Hellsing.

Continue reading
0 Comments

Hackers Turn to Radio Signals to Get the Data They Want

b2ap3_thumbnail_radio_signal_400.jpgYou should never assume that your data is safe from a hacking attack. Just like how the technology industry is working toward new ways to protect the public from hacks, those who lurk in the gutters of the Internet are trying to undermine these developments by any means possible. Some security professionals believe that even radio signals can undermine network security.

Continue reading
0 Comments

Even Homeland Security’s IT Is Preparing for a Security Storm

b2ap3_thumbnail_america_it_security_400.jpgJust like any other high-profile entity, a government should place great emphasis on its IT infrastructure. The U.S. government is moving through 2015 with an increased awareness of the state of cybersecurity, and with all of the huge security breaches that happen almost regularly, it qualifies cyber threats as important as other national security threats.

Continue reading
0 Comments

Virtual Private Networks: What They Do and How They Work

b2ap3_thumbnail_virtual_private_network_400.jpgAs a business owner, you know how difficult it can be to stay connected to the office while traveling. Despite being on the road, you’re still responsible for responding to clients, employee troubles, and other important tasks that must be addressed throughout the workday. You don’t want to use public WiFi to access corporate data, so your best bet is to use a Virtual Private Network (VPN).

Continue reading
0 Comments

3 Ways to Augment Your Password Security Practices

b2ap3_thumbnail_security_in_your_hands_400.jpgData breaches grow ever more common, especially in the professional sector. In the wake of high-profile hack attacks like those that targeted Sony and Home Depot, businesses are finding it more important than ever to invest heavily on security procedures and practices. However, one of the consistently forgotten aspects of security best practices is the password.

Continue reading
0 Comments

Operate Your Network on a “Need-to-Know Basis”

b2ap3_thumbnail_user_permission_400.jpgIf a company neglects network security, they’ll quickly find their network inundated with threats. However, if you fail to protect your business from internal problems as well, you might have a whole other monster on your hands. Some businesses have encountered this problem when employees access certain documents and then accidentally misplace or delete them, causing damage that your organization was not particularly prepared for.

Continue reading
0 Comments

Dyre Wolf Malware Bleeds Businesses of $1.5 Million Per Hack

b2ap3_thumbnail_dyre_wolf_phishing_400.jpgWith spring arriving, “winter is coming” as the new season of the critically-acclaimed television series Game of Thrones returns to millions of viewers worldwide. Ironically, there’s also a type of malware gaining traction in the online community that matches its bark with its bite, aptly dubbed Dyre Wolf. This threat has the potential to cost businesses as much as $1.5 million per hack, and takes advantage of the ever-common spear phishing tactic.

Continue reading
0 Comments

Tip of the Week: How to Choose a Good PIN for Your Credit Card

b2ap3_thumbnail_creditcard_security_400.jpgIdentity theft is commonplace on the Internet, and if you’re not careful with how you approach your browsing, you could potentially leak sensitive information to hackers. Unfortunately, some people are so concerned with protecting their other information, like Social Security numbers or dates of birth, that they forget that their PIN number is just as vulnerable to hacking as ever.

Continue reading
0 Comments

Are Your Smartphone Security Practices Really That Smart?

b2ap3_thumbnail_secure_your_smartphone_400.jpgYour computers and servers are protected from external threats, but have you thought about your business’s mobile devices lately? Some business owners who have an office full of mobile devices might not immediately think about the security risks associated with storing sensitive data on them. Therefore, it’s essential to consider these threats when planning your mobile device security strategy.

Continue reading
0 Comments

How to Delete the Smelly Superfish App From Your Computer

b2ap3_thumbnail_superfish_one_400.jpgNormally, you can trust the software that comes preinstalled on a new computer. Unfortunately, this isn’t the case with the shopping-search app Superfish, which came installed on every Lenovo device sold between September and December 2014. If you’ve got the Superfish app on your computer, then you need to remove it before it does some superbad damages. Here’s how you do it.

Continue reading
0 Comments

80 Million Medical Records Compromised: 4 Ways to Protect Yourself

b2ap3_thumbnail_anthem_hack_400.jpgThis month saw one of the largest recorded data breaches ever, when healthcare-provider Anthem experienced a hack causing data belonging to more than 80 million of its patients to be exposed. This includes sensitive information like Social Security numbers, dates of birth, email addresses, and more. How can you protect yourself from a hack like this?

Continue reading
0 Comments

Practical Biometric Passwords Infiltrate the US Military

b2ap3_thumbnail_biometric_security_400.jpgHumans are always striving to create the next big security measure against the massive wave of online threats. One topic consistently in discussion is biometrics as a security measure, which take advantage of unique biological aspects of users in order to maximize security. Now, the US military is seeing the value of this kind of technology, and they’re funding a campaign to make it available to users.

Continue reading
0 Comments

Looking for Virtual Love in All the Wrong Places

b2ap3_thumbnail_i_love_you_400.jpgOnline dating has been around long enough that it no longer carries a negative social stigma. In fact, you may know of some success stories from online dating--or you may have even successfully used online dating yourself. When looking for online love, remember to use protection from scammers.

Continue reading
0 Comments

These 4 Aging Internet Protocols Are Growing Increasingly Vulnerable to Hacks

b2ap3_thumbnail_internet_language_400.jpgWhen the Internet was first introduced, malware and hacking weren’t nearly as dangerous as they are in the present moment. Due to the unforeseen growth of criminal activity, the Internet wasn’t designed with advanced security practices put into place. Instead, it has grown to adapt to issues as they arrive, similar to the way an animal adapts to the changes in their environment over time. But sometimes, as time goes on, the environment changes too fast for its inhabitants to adapt.

Continue reading
0 Comments

Tip of the Week: How to Securely Connect to Public WiFi

b2ap3_thumbnail_wifi_security_400.jpgAs the Internet of Things and BYOD make headlines in the technology world, more and more devices are connecting to wireless networks. While this means that technology continues to grow more mobile, it also means that threats are given new avenues to access countless devices, many of which might contain information of a personal nature.

Continue reading
0 Comments

Security and Productivity Must Be Priorities with Your Company’s Email Solution

b2ap3_thumbnail_email_security_and_productivity_400.jpgWe’re all hooked on our email. It has revolutionized the way businesses communicate, and in many cases, it can be a major distraction. If you’re a small business trying to manage your own Exchange server, you’re probably aware of how much a headache email can be. Do you really have time to host and manage your own email solution?

Continue reading
0 Comments

Addressing 2 Primary Objections to Cloud Computing that Businesses May Have

b2ap3_thumbnail_cloud_computing_objections_400.jpgDespite cloud computing being commonplace, there are still some businesses holding out when it comes to migrating their data to the cloud. In most scenarios like this, a company has objections to the cloud that are preventing them from taking advantage of its many benefits. Are these objections valid? Let’s find out by addressing two of the most common objections to the cloud.

Continue reading
0 Comments

Tip of the Week: How to Lock Your Android Device

b2ap3_thumbnail_got_that_andoid_on_lock_400.jpgYou’ve got a lot of sensitive information stored on your mobile device. If it were to fall into the wrong hands, you wouldn’t want the new user to have easy access to it. This is why every mobile device should be locked. Here’s how to lock your Android device, as well as how to pick out a lock screen setting that’s right for you.

Continue reading
0 Comments

911: “What is Your Emergency?” You: “I’ve Been Hacked!”

b2ap3_thumbnail_rescue_911_from_hackers_400.jpgBelieve it or not, there are horror stories told of innocent people being abandoned by 911 dispatchers when they need help the most. This mainly isn’t due to incompetence on the dispatchers’ part, but because there are malicious forces that aren’t taken into consideration. Often, victims of 911 mishaps are misled by the odd hacker.

Continue reading
0 Comments

3 Security Factors to Look for In Your Business’s Network

b2ap3_thumbnail_three_security_factors_400.jpgA business is always at risk of being destroyed, be it online or offline. According to a study by 1&1, 67 percent of people confirmed that someone they know has had information stolen from them while online. In order to prevent your business from joining this statistic, there are several features you should look for when considering your network’s security.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Recent Comments

Tip of the Week: Which Headphones are Right for Your Needs?
23 April 2018
I will recommend Plantronics Backbeat Pro 2 SE Noise cancelling Headset with it's Great features.
Gamification: Make Business Fun for Everyone
27 January 2017
The world is based on the games. There are many types of games as per the aussie essay writing servi...
Let's Talk Tablets
12 January 2017
The concept of tablet is far better than that of PC because you can bring them with you everywhere a...
Tip of the Week: Tweak Your Workday in These 4 Ways and See Major Results
12 January 2017
The only thing will I will say regarding this blog is that it is very helpful at least for me. As I ...
WatchGuard Releases Version 10.2.7 for WSM, Edge, Fireware, and Fireware Pro
23 December 2016
I really needed to know about the fireware but i was confused that where can i find information abou...