Cyber Security

Who is Watching the Watchers?

Posted on Jan 18, 2019

Who is Watching the Watchers?

You hire a managed network services firm to watch your network and protect your business. But who is watching the watchers? To protect your business, here are questions you should ask of your IT service provider.

Read More »

Financial Industry Faces Mounting Cyber Security Threats

Posted on Dec 27, 2018

Financial Industry Faces Mounting Cyber Security Threats

Digital finance is quickly becoming standard practice. Yet for finance firms and financial planners, the ease of anywhere, anytime access also comes with increased risk. As noted by Scott Borg of the US Cyber Consequences Unit, financial information is “regularly stolen” by cybercriminals; consider the recent Equifax breach. According to the Financial Times, Equifax is still dealing with the fallout of stolen financial data, now scrapping employee bonuses and buybacks to deal with increasing remediation costs and poor public perception.

Bottom line? Financial firms can’t take a slapdash approach to network cybersecurity. All networks are exposed to numerous types of threats, and the financial industry has to defend and manage them as well or better than others — or risk major breaches.

Read More »

Which Group is Protecting Your Company?

Posted on Oct 16, 2018

Which Group is Protecting Your Company?

Hiring a managed network service provider is like hiring an army, a military unit that protects your business from cyber attacks. But not all managed network service providers are alike. This article covers what to look for when you hire a team to manage your technology.

Read More »

Partnering with Huntress Labs to Catch Undetected Threats

Posted on Jun 23, 2016

Partnering with Huntress Labs to Catch Undetected Threats

MNS Group proudly announces a partnership with Huntress Labs, a leader in innovative breach detection software. We are pleased to offer this advanced security service to all of our clients, helping them detect problems commercial anti-virus and anti-spyware software can’t.

Read More »

Ten Cybersecurity Measures You Can Afford

Posted on Jun 19, 2015

Ten Cybersecurity Measures You Can Afford

If large entities such as the Office of Personnel Management, Target, and CareFirst have all been victims of cyber attacks, what hope does a main street business have to secure its data?

The Cost of Inaction: Today the risk and cost of a data breach are overwhelming for small and mid-size business owners. Many owners don’t take action, largely because of these reasons:

Read More »

Two-Step Verification

Posted on May 13, 2015

Two-Step Verification

You probably heard it in the news last year—the private information of celebrities and other significant people has been leaked onto the Internet.

A primary reason this happens is because individuals respond to emails that seem to be valid. However, they inadvertently end up going through a password change process. In response to this, many manufacturers and service providers have instituted what is called “two-step verification.” What is this, and why should you use it?

Read More »