{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":90,"width":600,"title":"SECURING YOUR WORK TECHNOLOGY","description":"With much anticipation of imminent cyber warfare attacks increasing from Russia, in the midst of the ongoing onslaught of the Ukraine, out of a sense of urgency the next two podcasts were recorded. If you have not ensured that your work internet is secured, you will definitely want to listen as Cyber Security Expert Debi Carr joins Susan and Janice at the table to discuss what really needs to be done to protect any business from cyber warfare. Episode Highlights  The current landscape of cyber warfare Cyberwarfare is not contained to a country Four layers of cybersecurity protection  Quotes &quot;For us to have it in our heads that it\u2019s happening over there and it could never affect us here, is a myth\u2026\u201d \u201cWe are all still very vulnerable to this situation. The threat is real.\u201d \u201cWe work off IP addresses and you never know if that IP address is in Russia, the Ukraine or wherever.\u201d \u201cIf that email happens to have a trojan in it and they click on it, then it can affect all computers.\u201d&amp;nbsp; \u201c A lot of phishing emails are trying to get donations, creating fears that compel action - it all about the money.\u201d \u201cDo not follow any links in an email. If you get an invoice, do not enable ANY macros (should be a popup).\u201d \u201cBe careful where you are internet surfing.&amp;nbsp; Between February 25 2020 and March 25, 2020, over 500k websites were created and the FBI estimates that over 450k of them held malicious code in them.\u201d \u201cGoogle ads can be cloned by not the real company they supposedly represent and have malicious code downloaded into your computer by simply clicking.\u201d \u201cWe need to have a culture of security by having layers of security.\u201d \u201cNo personal emails on your work computer.\u201d \u201cEvery business in the US should have a firewall.\u201d &amp;nbsp;\u201cEvery business should have a perimeter defense.\u201d \u201cThey need a firewall that needs an active IDS that is constantly updating, like a traffic cop standing on the corner, making sure that all traffic has permission to be there.\u201d &amp;nbsp;\u201cUse active directory to grant user permissions for a workplace server.\u201d \u201cGuest accounts should have restrictions in the active directory setup.\u201d \u201cAlways use a VPN on your phone or laptop at a restaurant or hotel when accessing their internet.\u201d \u201cUsing Google\u2019s Incognito protects your privacy in search but does not protect from malicious coding.\u201d \u201cThe purpose of an active backup is to get back up as quickly as possible in the event of a malicious attack or crash.\u201d \u201cThe four layers need to be in your practice or workplace.\u201d Links &amp;amp; Resources&amp;nbsp; Debi Carr\u2019s Website: &amp;nbsp; &amp;nbsp; https:\/\/dkcarr.com\/&amp;nbsp; DK Carr &amp;amp; Associates Phone:&amp;nbsp; (844) 352-2771 Janice Janssen\u2019s Website:&amp;nbsp; &amp;nbsp;GTSGurus.com (sign up for the newsletter) GTS Phone:&amp;nbsp; 844-664-4487 Susan\u2019s Website:&amp;nbsp; https:\/\/SusanGunnSolutions.com&amp;nbsp; (sign up for the newsletter) SGS Phone:&amp;nbsp; 888-994-3167 Book  Money In, Money Out: Financial Organization In Your Practice&amp;nbsp; Book Getting The Most Out of QuickBooks In Your Practice&amp;nbsp;&amp;nbsp; Book Advanced QuickBooks In Your Practice&amp;nbsp;&amp;nbsp; Ask The Expert Online Consultation ","author_name":"Money In, Money Out","author_url":"https:\/\/www.susangunnsolutions.com","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/22384391\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/88AA3C\/\" height=\"90\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/content\/122780315"}