Security

#
River Run’s R-Security strategy is “an umbrella” that includes a comprehensive Security Foundation Review of physical and virtual cyber threats and vulnerabilities in your office or via those working remotely, and the impact an incident or breach could have on you, your team, your clients, and…
Read More >
#
Remote workforces and sophisticated hackers change the risks businesses are facing. The COVID-19 pandemic has changed the ways businesses operate. It has also changed the potential security risks that hackers leverage to gain access to corporate data. People working from home and the use of…
Read More >
#
With over 94% of text messages read and over 45% responded to, it is no wonder why there has been an explosion of “Smishing” (just like e-mail phishing, but by text) in 2020. We have all gotten sick and tired of the daily spam and junk e-mail, so tools and our own common sense have us only…
Read More >
#
Four scams to avoid and some Fraud-stopping tips to review
Read More >
#
In this article, I address growing security issues including, "What is clear is that there is no single framework that can become a magic bullet for an employer to deal with cybersecurity concerns now and in the future. This is truly a risk mitigation game." River Run can help. #cybersecurity…
Read More >
#
Key IT considerations to plan for when employees return to work from corona virus stay-at-home orders: 1) Returning Device Security; 2) Asset Inventory and Future Needs; 3) Software License Inventory; 4) Update Operating Systems and Software; 5) Unregistered Software; 6) Security Scanning,…
Read More >
#
We are living in unique times when people under economic stress do things they normally would not. We are doing what we can to help business owners protect what they have. And, we are not just talking cybersecurity.
Read More >
#
Amidst the coronavirus pandemic, many governments are moving into the “delay” phase of their strategy to fight the virus. This includes social distancing techniques including closing schools and asking people to work from home. Elsewhere, people are having to or opting to work remotely to…
Read More >
#
Best practices and security checklist for working remotely – IT Checklist, Employee Checklist, Awareness
Read More >
#
Why are some companies avoiding 2FA (Two-Factor Authentication) and MFA (Multi-Factor Authentication) as if someone in authority over us is asking us to eat all of our vegetables or take out the trash?
Read More >