BrevAll Adds New Strategic Partner, Nina Knight, to its Growing Technology Business

Nina Knight, Strategic Partner

NORTH RICHLAND HILLS, TEXAS – July 22, 2019 – Nina Knight has joined BrevAll Technologies as co-owner and President of the 31-year-old, North Richland Hills, Texas-based managed services technology firm. Knight has invested in the firm and joins Paul Enloe, Founder, and CEO as they continue to offer leading-edge technology offerings, expertise and superior levels of local support.

Nina Knight, Strategic Partner
Nina Knight, Strategic Partner

“In her new role, Nina will work to increase the BrevAll presence within the industry and drive revenue growth,” said Enloe. “We have known each other for years and supported the same customers. She has a great reputation that fits the BrevAll model, and we welcome her expertise to our great organization.”

Prior to joining BrevAll, Knight has spent the last 30 years building and running leading-edge sales and service organizations. Knight has developed proven processes for delivering more profits to the bottom line while providing high levels of customer satisfaction. Knight’s track record of running lucrative, customer service-oriented companies is accompanied by consistently beating the industry benchmarks utilized to measure success.

“BrevAll is a well-managed Technology Services Provider that helps organizations leverage their investment in technology to maximize their productivity and profitability,” said Knight. “The company has an established strong service reputation and continues to go above and beyond to exceed clients’ expectations.

“Paul and I have similar values and truly care about our clients and our employees. There is tremendous synergy between us and we plan to leverage our business strengths to continue to improve and grow BrevAll. We are excited about the future of our partnership.”

Knight also owns a consulting firm called Knight Momentum Consulting Group that offers both Business Growth and Technology Consulting.

Knight grew up in St. Louis, Missouri and has degrees in Business Administration and Marketing from Arizona State University. Aside from helping companies and individuals reach their potential, she enjoys giving back to the community, golf, travel and spending time with her family.


BrevAll Technologies, Inc., founded by Paul Enloe, CEO, is a 31-year-old, North Richland Hills, Texas-based technology firm focused on Cybersecurity, Dark Web Monitoring, Managed IT Services and Voice over IP Cloud Solutions.

7 Ways Hackers Can Exploit Your Employees on Social Media

Nearly two decades into the social media era, most of the nearly 3 billion people with social accounts can separate good decisions from bad. Still, it’s all-to-common for people to shoot themselves — and their companies — in the foot with mistakes that cybercriminals make a living by exploiting. While these mistakes are often made innocently and unwittingly, it doesn’t make their end-result any less calamitous.

While restricting social media access on work computers is a good start, not even that will completely insulate your business. Regularly refreshing your employees on social media safety is the more effective way to keep cybercriminals at bay.

Here are seven of the biggest ways your employees can be exploited.

  1. When Phish Attack: While phishing attacks are most closely associated with emails, social media sites like Facebook and Twitter are also a playground for hackers. In fact, social media phishing jumped an astounding 500 percent in 2016 and has continued to rise in the years since. Phishing is often attempted via links to fake stories, which are either laced with malware or attempt to trick you into sharing sensitive information.
  2. Lose Your Attachment: When it comes to social media attachments, suspicion and skepticism are always the best policies — especially when they come from untrusted sources. Your employees should always avoid opening attachments from senders they don’t know, as you never know what kind of malware is lurking under the surface. In other words, your employees need to think before they click.
  3. Picture This: More than 3.2 billion pictures will be shared on social media today. That’s more than 15 billion pictures going up just this week! So what’s the big deal if your employees post a picture or two at work? The problem is that you just never know what company secrets are lingering in the background. Hackers can zoom in on pictures to find passwords, financial data or trade information discreetly lingering on post-it notes, whiteboards and computer monitors.
  4. Angry on the Internet: People like to let out steam on social media. It should come as no surprise that this is a bad idea, especially when the target of the person’s vitriol is their employer (or in the case of ex-employees, former employer). Disgruntled people tend to make poor decisions, like revealing sensitive information that can come back to haunt your business. While you can’t control what people say, there are certainly ways to deter them.
  5. Identity Fraud: Facebook, Twitter and Instagram are no substitute for Outlook, Slack or Skype when it comes to having sensitive business conversations. Social media accounts can easily be hacked with a stolen password, opening the door for imposters to masquerade as one of your employees and get a “coworker” to spill revealing information.
  6. Spoof Accounts: Another reason to be skeptical of social media requests, hackers can easily set up a spoof account that to the untrained eye is indistinguishable from the victim’s real account. According to some reports, 2 to 3 percent of all Facebook accounts (or roughly 60 million) are fake. If one of your employees finds himself on the receiving end of an odd request, he should reach out to the person supposedly contacting him using a more trusted method. Even if the request is legit, the conversation should be moved to a more secure platform.
  7. TMI: Oversharing no longer just refers to personal information. Every little detail you share, even seemingly innocuous morsels like your birthday and your pet’s name, can be used by cybercriminals to verify your identity, and as a result, get one step closer to hacking your business. Urge your employees to exercise extreme caution about the info they give away.

More than Money: 5 Hacker Motivations You Must Take Seriously

Without a doubt, the primary motivation for hackers is money. But the pursuit of the almighty dollar is hardly the only reason a skilled hacker might be tempted to break into your system. In fact, if you round up all of the major cyberattacks since 2016, from the Panama Papers to the leak of Hillary Clinton’s private email server, many of them were motivated not by financial gain, but rather vigilantism and social justice.

The point is this: even if your computer system lacks the trove of customer financial data that many hackers covet, that’s not an excuse to take your cybersecurity any less seriously. All it takes is one bored, semi-competent hacker to break into your system and cause a volcanic problem.

Here are five reasons a hacker might be motivated to target your business.

Money: The type of hacker motivation that keeps CTOs up and night, financially driven cybercriminals make a living stealing credit cards, personal information and other data. Whether the hacker uses the stolen information himself or sells it on the dark net for a hefty payday is immaterial to the victim.

According to Visual Capitalist, money is the primary motivator for attacks on businesses in nearly every space, from retail to healthcare. But it’s not just businesses that are in the crosshairs. Who can forget the infamous WannaCry attack, in which millions of everyday Internet users around the world had to pay a ransom to regain access to their computers? As long as people use the Internet, hackers will be out for their money.

Hacktivism: While most hackers are out for money, others are out for reasons far more personal. These hackers are affectionately known as hacktivists. We saw many examples of hacktivism during the 2016 presidential election, when hackers launched a number of attacks designed to expose injustice and hurt their political adversaries. The website summed it up best in an article titled 2016: The Year Hackers Stole the Show — With a Cause.

“From Clinton campaign emails revealed by WikiLeaks to DDoS attacks against governments, banks and other corporations, the hacktivist corner of the Net never slept in 2016.”

Hacktivism, though, is more than just an instrument used to influence elections; it’s also used to expose social injustice and promote personal agendas. The most famous hacktivist group, Anonymous, is known for its protest-fueled DDOS attacks on government agencies, the Church of Scientology and other victims with whom it shares ideological differences.

The Challenge: Hacking for the thrill of it? Indeed, it’s a thing. While some people like to spend their free time playing sports or video games, others prefer to breach complicated security systems. They’re drawn to the challenge and are intoxicated by the thrill of penetrating a so-called impenetrable system. Some might call them white hat hackers, since their intent is not malicious. But you’d still be wise not to let them through the door.

Vengeance: Sometimes in business you just upset the wrong person. According to Visual Capitalist, anger motivates 20 percent of cyberattacks. Spiteful hackers may try to exact revenge on its victims by defacing their website, installing viruses, leaking personal data or editing content in an embarrassing way. Many of these attacks come from script kiddies, a term that refers to amateur, unskilled hackers who use existing computer scripts or code to hack to attack a third party’s system.

Espionage: While it seems more like the premise of an Aaron Sorkin screenplay than a real-life threat, it’s not uncommon for corporations to hire hackers to trespass a competitor’s computer system for the purpose stealing company secrets. While most cases of corporate espionage go unreported, a 2017 study by the University of Portsmouth found that espionage via hacking costs the U.S. economy $400 billion per year.

The cybersecurity experts at BrevAll Technologies have the experience and expertise to help your business stave off all types of cyberattacks, regardless of the motivation behind them. Contact us today to learn how we can keep your computer systems safe.

6 Tips to Keep Your Small Business from Being Hacked

The likelihood that a hacker has your small business in the crosshairs is higher than you think.

According to this Barkly report, 61 percent of small businesses in the U.S. experienced a cyberattack from May 2017 to May 2018 — up 6 percent from the previous year. Even worse? According to the same report, malware-related attacks cost small to medium sized businesses (SMBs) an average of $2.2 million: $1 million due to damage or theft of IT assets and $1.2 million due to disruption of normal business operations.

Think about those statistics for a second. Can your business afford to lose that much money?

It’s 2019 and no business of any size has the luxury of being lackadaisical about its cybersecurity. Take a proactive approach to fending off hackers by following these tips.

  1. Tighten Up Your Mobility Policy: The popularity and viability of remote offices continues to increase as more and more businesses enable VPN access. While there are clear and obvious benefits to mobility, the downside is the threat it poses to your security.
    Wherever your employees are working, they are taking your data with them. This data can be easily stolen if your employees use unsecured wireless networks or exercise poor judgment in public places, where inquiring eyes and ears lurk about. The safest policy is to restrict network access to the confines of your office, but if that’s not realistic, at the very least you should prohibit employees from working in coffeeshops, airports and other bustling spaces.
  2. Educate Your Employees: All employees, regardless of job title, should undergo mandatory cybersecurity training that breaks down what they should and should never do on their work computers. The majority of SMB security problems stem from a single employee visiting an unsafe website, clicking on a suspicious link or downloading a malicious file. Cybersecurity training can help you stamp out some of the behaviors that make networks vulnerable.
  3. Update Your Operating Systems: It’s pretty shocking how many computers and smartphones out there are running on obsolete, security-deficient operating systems. A single device running on an old OS can give a hacker the keys to your entire network. Your devices should ping you when an operating system update is available — be sure that your employees install these updates immediately so there’s never a lapse in your cybersecurity.
  4. Update Passwords Frequently: Frustrate hackers by requiring employees to change their passwords at least once every couple of months. Using the same password for an extended period of time will only increase the chances that a determined hacker eventually cracks your code. To that end, all passwords should feature a random combination of letters, numbers and symbols, and should never be written down or stored in places where they can be discovered.
  5. Encrypt Your Data: This will provide your business with an extra layer of security in case an employee’s device falls into the hands of the wrong person. Encrypting data — making it indecipherable to anyone without a password — is particularly important for businesses that store sensitive data, such as credit card numbers. There are several encryption programs you can install right now that will help you safeguard your data.
  6. Get Professional Support: Partnering with a cybersecurity company such as BrevAll Technologies is the surest way to prevent your network from being breached. From dark web monitoring and managed IT services, to security training and technical assistance, we will enhance your business’s security in every conceivable way.

Remember: the average malware attack costs SMBs over $2 million! Don’t become a cautionary tale. Contact BrevAll Technologies today to protect your business at a price you can afford.

The Rising Threat of Cryptojacking — and How to Protect Your Business

With little regulation and a combined value of $613 billion at the end of 2017, it’s no surprise that cryptocurrencies are a prime target for cybercriminals. What is surprising is that ordinary businesses with absolutely no crypto interests or holdings could be targeted by hackers.

And yet, that’s the position in which countless businesses unknowingly find themselves: in the crosshairs of a new cybercriminal enterprise known as “cryptojacking” that some experts say is today’s foremost threat to the security and performance of electronic devices.

According to, there were 2.4 million instances of cryptojacking in the first half of 2018 alone. The volume represents a staggering 459% increase since 2017. And unless the value of cryptocurrencies such as Bitcoin and Ethereum continue to crater, cryptojacking is likely to become an even greater issue in the years to come.

To understand how cryptojacking works, it helps to have at least a basic understanding of “cryptomining,” the computing activity by which cryptocurrencies are obtained. In essence, some cryptocurrencies can be legally earned by facilitating transactions. Without getting into the weeds, this is a complex process that requires a significant amount of computing power.

Many hackers lack the resources needed for cryptomining so instead they do what in their minds is the next best thing: exploit the processing power of businesses. The more computing power they can access, the more efficiently they can mine for cryptocurrencies, and the more quickly they can line their pockets. According to CSO, hackers install cryptojacking scripts on unauthorized computers in two primary ways:

  • Phishing tactics, such as baiting employees into clicking on malicious email links.
  • Infecting a website or online ad with JavaScript code that auto-executes once loaded into the victim’s browser.

While cryptojacking scripts will not immediately damage your computers or compromise your data like many other types of malware, they can steal your network’s resources and cause a number of performance issues. Over time, they can even cause irreparable damage to hardware by causing the temperature of devices and their batteries to reach extreme levels.

For these reasons and more, it’s important to be aware of the cryptojacking threat and some of the easy ways to fend off would-be miners.

Here are 5 simple ways to detect and thwart hackers from cryptomining on your devices:
Go Phish
: The vast majority of the world’s malware is delivered via email. Not coincidentally, malicious email links are also one of the primary methods through which hackers inject cryptomining script into their victims’ devices. Make sure your employees never click on links or open attachments from senders they don’t recognize, and if they do, make sure they notify your IT staff immediately.

Monitor Resources: Make it a daily point to evaluate the resources being consumed by your network. If you notice a sudden, inexplicable drop in memory, it may be a sign that malware has been installed and that your resources are being siphoned off by an unauthorized party. Similarly, if there’s an abrupt surge in hardware or performance problems (i.e. overheating, slow speed, random shutdowns), that’s also a red flag that your system has been penetrated.

No Coin Extension: To block coin miners from accessing your computer, Google Chrome offers free extensions such as No Coin and minerBlock. When you visit a website, these extensions will detect, block and inform you of suspicious cryptomining activities.

Restrict Access: As eluded to earlier, another go-to cryptojacking technique is injecting malware into a website or pop-up ad. To combat this type of attack, limit your employees’ internet access to trusted websites and install plugins to block ads and non-authorized URLs.

Important Updates: Malware is often spread on old browsers and applications, so always make sure your employees are using the most current software available. Additionally, uninstall software that isn’t being used to minimize your exposure.

While these defense tactics will certainly lower your risk factor, they’re just a start. Teaming up with the cybersecurity experts at BrevAll Technologies is the only surefire way to make sure your business is protected from cryptojacking and all other external threats.

8 Signs Your Employees Have Been Hacked

With more than half of malware attacks now targeting small businesses, every employee in your organization, regardless of title or seniority, needs to play a role in protecting your digital turf. While education is an important first step when it comes to thwarting cyberattacks, not even your most protective, cyber-savvy employees are unassailable.

Modern hacking efforts are crafty and well-disguised. Malware is delivered in everything from email attachments and browser toolbars; to pop-up ads and free software. In other words, there’s only so much “defense” you can play.

As important as knowing how cybercriminals attack is knowing when they have attacked. The sooner your employees recognize that a potential breach has occurred, the sooner your IT staff or cybersecurity partner can triage the threat and intervene.

Keep your employees on their toes by educating them on these 8 “OMG, I’ve been hacked” warning signs.

  1. Your device is suddenly slower: Speedy devices that are suddenly acting slowly and sluggishly can often blame their behavior on malicious software running in the background that’s consuming all of their processing power. Open up your device’s task manager — if there’s an application you don’t recognize eating an inordinate amount of memory, it could be a virus.
  2. Your cursor has gone rogue: While random mouse movements can often be attributed to faulty hardware, they may also indicate that your device has been hacked and is now being controlled by someone else. The key is to pay attention to the mouse movement. If the cursor drifts to a “clickable” area, such as a web browser, you’ve almost certainly been hacked.
  3. Your trusted websites are suddenly littered with pop-ups: Arguably the most annoying of all the malware hacks, random pop-ups from websites that don’t typically produce them should arouse your suspicion — especially if they’re bypassing your pop-up blocker. Be especially wary of messages that claim you’ve won something, or attempt to scare you into thinking you’ve been hacked. Needless to say, ignore all suspicious pop-up messages.
  4. Your password isn’t working: If your password isn’t working — and you’re certain you’re entering it correctly — a hacker may have accessed your device or account and changed the password to keep you out. This is one of the most dangerous cyberattacks because the hacker can now not only steal your credit card numbers and other sensitive data, but also exploit your business contacts by pretending to be you. If your password is stolen, inform your company immediately. Then, change ALL of your passwords across all of your other accounts and devices, even if the password is different than the one that was breached.
  5. Your internet searches are being redirected: If your internet searches are being rerouted from your intended website to a sketchy URL, that’s a pretty clear sign you’ve been hacked. Why would a cybercriminal want to direct you to a specific website? In most cases, to generate revenue from third-party search engines such as Google. For hackers, hijacking your browser can be a quick way to earn a payday.
  6. Your device suddenly restarts: Although automatic restarts are common when installing new software and authorizing routine system updates, random restarts that occur without warning should raise suspicion. It’s possible that malware was just installed on your device, and the restart was triggered to complete the process. While it’s more likely that your malware-laced device will slow down versus flat-out restarting, this possible outcome should be on your radar.
  7. You notice random browser toolbars and add-ons: Toolbars and add-ons offer a number of benefits, shortcuts and other efficiencies, but they’re also popular ways for hackers to discreetly embed malware. Periodically open your web browser and check your toolbar and add-ons. If you see something you don’t remember installing, err on the side of caution and remove it.
  8. Your antivirus is disabled: If your antivirus scanner abruptly stops working, malware is likely the culprit. When malware penetrates your system, one of the first things it does is disable your device’s antivirus software and block your access to antivirus update servers. Here are some helpful tips to make sure your antivirus software is working.

If your small or mid-sized business is overwhelmed by the relentless threat of cyberattacks, our cybersecurity experts are here to help. Unfortunately, hackers will never stop trying to breach your system. Their tactics will continue to evolve and their breaches will become harder and harder to detect. You need an experienced cybersecurity expert in your corner to defend your business from these potentially catastrophic attacks.

Contact BrevAll Technologies today and let us prove that we’re the answer to your cybersecurity needs.

Why Dark Web Monitoring is Essential in 2018

Dark Web Security Threats

Dark Web Security Threats
To the everyday person, the mere thought of the “Dark Web” sends chills up the spine. It makes you think of hooded people in shadowy lairs, hacking sophisticated systems and monetizing from society’s most nefarious underground industries.

The Dark Web’s association with drug dealing, human trafficking and other heinous ventures has made its threat to legitimate businesses seem almost like an afterthought. Some small business owners can’t fathom why a cybercriminal capable of hacking a giant corporation or cashing in on other illicit activities would waste time hacking their relatively fruitless company.

The truth is, no business, no matter the size, is beneath the threat of attack. Not when you consider the Dark Web’s emergence over the last few years as an information superhighway and marketplace, where all stolen data, big and small, can be seamlessly sold in exchange for untraceable cryptocurrency.

In 2018, the threat of the Dark Web is greater than ever. Some experts estimate the deep web, which encompasses anything that a search engine can’t find, is about 400 to 500 times larger than the common internet.
Cybercriminals are scouring the Internet looking for easy targets. If you don’t have a plan in place to neutralize the threat, your business could pay a steep price.

What is the Dark Web?

The Dark Web can best be described as the “underbelly” of the Internet; a shrouded place that’s only accessible via special software. Comprised of a series of encrypted networks that mask users’ names, locations and IP addresses, the Dark Web essentially paves the way for people to commit crimes with little risk of being personally identified.

Over the last decade, businesses everywhere have been engulfed by the Dark Web. When Target was hacked in 2013, 40 million debit and credit cards belonging to shoppers were discovered on the Dark Web, according to CNET. The same publication reported that 200 million stolen Yahoo! logins were marketed on the Dark Web in 2016.

Just a few months ago, a notorious cybercriminal in the U.K. was found to have allegedly breached 17 different companies, including Uber and Groupon, and sold their stolen customer data on the Dark Web. There are countless other stories of big and seemingly secure corporations falling victim to such types of attacks.

The risk to small business

While large-scale data breaches dominate the headlines, small businesses are an even more tantalizing target for some cybercriminals. According to Symantec’s 2016 Internet Security Threat Report, 43 percent of cyber attacks are lodged against small businesses — a 9 percent increase compared to 2014, according to Fortune.It goes to show that cybercriminals don’t discriminate based on the size of a business; they only care about its vulnerability. This makes small businesses a prime target, since many don’t have the resources or expertise to combat or even recognize an attack when it occurs.

It’s imperative that all small businesses take their security seriously, especially those that store passwords, financial data and other compromising personal data. If your business is hacked, your customers’ data could end up for sale on the Dark Web. And that would be very bad for everybody. Fortunately, there’s an affordable way to guard against these attacks.

Take a Proactive Approach

The most fundamental mistake small businesses make when it comes to security? Being reactive instead of proactive. They ignore Dark Web threats until they’ve been attacked, and then they’re left scrambling to solve a problem for which there may not be an immediate

The key is to assume a breach will eventually happen, so that when one does occur, you already have safeguards in place to neutralize the attack, as well as protocols for reporting the attack, which small businesses owners are required to do in the event of a data breach.

The best way to be proactive is to invest in Dark Web Monitoring from a security expert like BrevAll Technologies. A perfect alternative for companies that don’t have the resources to invest in onsite IT staff, we will monitor the Dark Web 24/7 for compromised information associated with your business. And if there’s been a breach, we will jump in before that
information can be used for identity theft and other crimes.

The Dark Web is only getting darker. It’s time to step up and make sure your customers’ information — and business’s reputation — is protected. Otherwise, it could be lights out.

5 Ways Blockchain is Disrupting Cybersecurity

Blockchain Diagram

Blockchain was invented in 2008 to serve as the public transaction ledger for the cryptocurrency bitcoin. A decade later, the technology is revolutionizing more than just the financial industry. It’s shaking up the entire economy.

Although blockchain’s roots are in digital currency, its core technology has countless other applications, from logging data to cataloging intellectual property. As a result, business owners everywhere are scrambling to figure out how they can leverage blockchain technology to protect their data and thwart cybercriminal activity.

Given the ever-increasing threat of cybercriminals, it’s no surprise that cybersecurity is top of mind for businesses everywhere — or that demand for blockchain engineers has skyrocketed in recent years. According to the publication CSO, cybercrime is projected to cost the world $6 trillion in damages annually by 2021, up from $3 trillion in 2015. As a result, cybersecurity spending is expected to exceed $1 trillion from now until 2021.

While Blockchain is relatively new technology that’s still evolving, its ability to encrypt, validate and protect data already makes it a viable candidate to solve the cybercriminal scourge. Here are five ways blockchain is helping businesses shore up their cybersecurity.

Hard to Hack: Blockchain is structured in a way that makes it virtually impossible to corrupt. Unlike traditional servers, which store information in a single repository, blockchain data is stored on a decentralized P2P network comprised of thousands of computers. Every computer that participates in the node has a copy of all transactions made on the blockchain. Since there’s no “official” copy of this ledger, tampering with it would require hacking multiple computers at once. This would be extremely difficult for even the most sophisticated hacker, considering the immense computing power it would require.

Anonymous: While all blockchain transactions are transparent, individual users get to maintain their anonymity. Here’s how: when a user completes a transaction (i.e. Jon sends bitcoin to Jill), the details are published on the blockchain. However, personal details such as the user’s name are concealed. Instead, the transaction record is attributed to an auto-generated private key, which is virtually impossible to trace back to the user. This allows transactions to be transparent, while at the same time protective of a user’s sensitive personal information.

Validation: To ensure the integrity of a blockchain, every transaction is validated by every computer in the node. Once a transaction is validated, it’s stored in a block and permanently sealed. Now part of the blockchain, the transaction cannot be altered. Consider the benefits blockchain has over traditional databases, which can be destroyed or tampered with — intentionally or unintentionally — by anyone with an access key.

Battle Ransomware: Last year’s infamous WannaCry attack not only pushed the threat of ransomware into the public consciousness, it also served as proof of concept for other cybercriminals. While many ransomware operators request their payment via digital currencies such as bitcoin due to the anonymity it affords, blockchain can also help investigators find the perpetrators behind the attack. As SecurityIntelligence explains: “To use extorted bitcoins, fraudsters must transfer them to a third-party address, possibly a bitcoin register or wallet, where service providers process a flat currency exchange. These suppliers can identify bitcoin addresses associated with ransomware campaigns and quickly notify cybersecurity specialists.”

Prevent DDoS Attacks: A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt a web property, such as a server or website, by overwhelming it with traffic from multiple sources. DDoS attacks have victimized a number of well-known companies over the last few years, including Twitter and Spotify. Since Blockchain distributes data throughout a large P2P network — as opposed to storing all data in a single repository — it’s in many ways the perfect solution for preventing costly DDoS attacks.

To learn how you can leverage blockchain for your business, contact the cybersecurity experts at BrevAll Technologies. Call us at (800) 838-0911 or email

15 Cybersecurity Tips for Small Businesses

Small businesses are becoming a bigger target for cyber-criminals.

According to the Ponemon Institute Research Report, 61% of small businesses were attacked from October 2016 to September 2017, and 54% experienced data breaches involving customer and employee information. Both numbers were up from the previous 12 months.

If you own one of America’s 28 million small businesses, here are 15 minimally expensive steps you can take right now to strengthen your cybersecurity and protect your business.

1) Secure your Wi-Fi Network: One of the easiest ways for cybercriminals to hack your network is via Wi-Fi. Defend against this by hiding your Wi-Fi network to all non-authorized personnel. To hide your Wi-Fi network, set up an encrypted wireless access point and disable outside network access.

2) Enable HTTPs: Used by financial institutions, “HTTPs” are more secure versions of traditional “HTTP” websites. HTTPs have an SSL/TLS Certificate installed onto their servers that encrypt all communications between your browser and website, ensuring that customer information, such as credit card numbers, cannot be intercepted.

3) Update Your Password: Frustrating? Yes. But demanding employees change their password frequently mitigates the damage is case their original code has been stolen. Strong passwords contain at least 10 characters and include numbers, symbols and upper and lowercase letters. Employees should never write down their passwords or use the same password for multiple company applications.

4) Minimize Password Attempts: Did you know there’s software that can guess your password in a matter of minutes? Guard against this by reducing the number of incorrect passwords an employee can enter. If that number is reached, temporarily freeze the employee’s access until you can verify there was no attempted breach of your network.

5) Multi-Factor Authentication: Another way to secure your network is by enabling multi-factor authentication, which requires more than one method of authentication to verify a user’s identity. Make sure vendors that handle your data also use multi-factor authentication.

6) Update Software: Hackers can enter your network through outdated browsers and applications, so make sure your entire staff is using the most current software available. For the same reason, make sure employees who use mobile devices for work are diligent about downloading the most updated apps and operating systems.

7) Safeguard Payment Cards: Contact your credit card processors to make sure they’re employing the most stringent tools and anti-fraud services to protect your customers’ credit card and/or other financial data.

8) Limit Access to Network: Instruct employees to lock their machines when they’re not using them and establish security checkpoints to inhibit non-authorized personnel from gaining access to areas of the building in which they do not belong.

9) Limit Access to Data and Software: For the same reason you wouldn’t give all of your friends a key to your house, you shouldn’t give employees access to data or software that isn’t germane to their jobs. This will help keep your security tight, as well as troubleshoot any security issues that may materialize.

10) Back Up Data: Frequently back up all essential data and documents and store copies in a different location than the original, such as an external hard drive or the cloud. This will allow you to easily recover data that’s been lost or stolen.

11) Phishing Prevention: Phishing scams affect thousands of organizations every month. Train employees to never open attachments or click links in emails from unrecognized senders, who could be hackers looking to install malware onto your computer.

12) Encourage Open Dialogue: If your employees detect anything suspicious, whether it’s a potential phishing attack or a watering hole, urge them to report it immediately. Senior management should then investigate the incident and, if necessary, notify the entire organization, because chances are multiple employees have been targeted.

13) Social Security: Employees often turn to social media platforms like Facebook and Twitter to blow off steam. In some cases, they may not be aware that they’re divulging trade secrets or sensitive information. Make sure you educate them about what they cannot say on social media — and hold them accountable for breaking the rules.

14) Ban Working in Public Areas: While parks and coffeeshops may seem like harmless places to work remotely, they can actually be quite dangerous. You never know who’s sitting right next to you, sneaking peeks at your computer or eavesdropping on your phone conversation. When it comes to cybersecurity, you can never be too paranoid.

15) Rapid Response Protocol: If your business has been attacked, you don’t want to be caught flat-footed. Develop a proactive plan for how to quickly and effectively respond. Engaging the services of a cybersecurity expert like BrevAll Technologies is always a smart first step.


BrevAll Technologies Becomes Virtual CIO for Small to Mid-Sized Businesses

Businessman hand working with modern technology and digital layer effect as business strategy concept.

NORTH RICHLAND HILLS – BrevAll Technologies a leading managed technology services provider, announced today that the company will now be serving as a Virtual CIO (Chief Information Officer) for small to mid-sized business (SMBs) who are looking to focus solely on expansion and revenue
growth. BrevAll Technologies will step forward into a vCIO role elevating its position amongst customers that desire a greater level of strategic business guidance.

By not only maintaining the IT infrastructure, planning the technology roadmap and identifying new ways to utilize emerging technologies to enhance SMB productivity its consultation will enable leadership of the SMB
to focus exclusively to growth, in order to sustain a competitive advantage. As BrevAll Technologies makes this move,

SMBs of the future will not have to deal with the challenges of technology, its rapid growth and the constant stream of changes.

Now, BrevAll Technologies has the capacity to join forces with SMBs who want a proactive partnership to accelerate organizational growth.

Find out more by reading our latest press release…