We’ve all read about ransomware attacks. When it happens to someone else, it’s easy to advise the victim not to pay up. After all, you don’t want to encourage the ransomware business model. However, there’s a lot of debate about…
CISCO recently surveyed more than 3,000 security leaders in 18 countries, asking them how they were implementing cyber security best practices to protect themselves. CISCO’s 2019 CISO Benchmark Report summarizes how companies are preparing for cyber threats, how they are…
Scammers are developing new techniques all the time. In recent years, they’ve added smishing and vishing to the arsenal of tools that they can use to ruin your day. What are these new threats, and how do we protect ourselves…
Passwords. They’ve been a keystone of IT security since the dawn of the internet. We have rules about how many letters, numbers, and special characters we have to use in our passwords. Some websites even make us change our passwords…
Video messaging app Dubsmash recently revealed was breached resulting in over 160 million records being exposed including unique email IDs, usernames and passwords. Information is already being sold on the dark web as part of a 617 million record package…
If you’re like most people, you close your bedroom curtains at night and shut your office door when you need to have a private conversation. So why are you still sitting in front of an uncovered webcam? To be fair,…
As the summer travel season approaches, many of us look forward to spending valuable time with family. Often, this takes us out-of-town to locations we’re not very familiar with. This time away from home also means time away from the…
If you’re a small to medium-size business owner, how long could your business survive if you suffered a breach in data that resulted in lost customer data? How long could you afford to be without critical business IT systems? These…
All businesses, from small to medium to large, face the same cyber-security threats. In recent years, cybercriminals have increasingly targeted small to medium-size businesses (SMBs) because they lack the budget to employ a full-time IT staffer who is charged with…
News flash! Cybercriminals and hackers are no longer just targeting Fortune 500 companies large-scale operations. They’re now coming after small to medium size business (SMBs) owners with just as much force. What’s more, SMBs are significantly less prepared to deal…
Proudly based in Plainfield and serving the surrounding area:
BKS Systems has been a trusted managed IT consultant in Northern Illinois and Northwest Indiana since 2000. We proudly serve the following areas and beyond.