An incident response plan is an organized approach to addressing the aftermath of a security breach or cyber-attack. Certain industries, like medical or financial institutions, absolutely should have one.

But even if you don’t have a lot of sensitive information, it’s best to have SOME idea of what you would do if a cyber-attack locked all your files or stole confidential information.

Things to consider when you’re planning:

• Physical access to your building(s)
• What to do with lost or stolen mobile devices
• PCI (payment card industry) compliance requirements
• Data-breach incident response
• Threat monitoring


That’s where we are here to help! Give us a call: 516-829-3687 and we’ll be glad to help you put together a cyber-response plan.

With the recent cyber-attacks on large retail stores like Target and Neiman Marcus, businesses of all sizes must take proper precaution to ensure the security of both their own private data and the personal data of their customers. Aside from an innovative business continuity plan and secure IT support, an efficient business network relies on strong passwords from owners and employees.

According to The Washington Post, the Target hacker used software known as BlackPOS to infect sales systems and steal credit card information along with other financial records. The 17-year old Russian teenager then gained remote access by trying several easy and commonly used passwords, eventually logging in. Using “weak passwords” for your business’s cloud storage can leave your IT network exposed to personal data leaks. As the leading IT specialists, Brash Concepts warns businesses of the potential risk of using vulnerable passwords.

Here are a few IT consulting tips for strengthening your weak passwords to ensure your data remains private:

Strong Passwords: A strong password contains upwards of 14 characters. This includes a combination of upper and lowercase letters as well as at least one number and one symbol.

Use Mnemonic Devices: Do not use the same password for multiple devices and data libraries. Use the first letters of an easy sentence for a strong and unique password for each level of security. Example: a5Ceg: all 5 Cows eat grass.

Passwords Require Consistent Updates: When going through a system update or a network change, it is best to change your password to something new and equally complex.

In addition to privately monitored IT consulting from Brash Concepts, business owners and employees must take individual steps to protect their personal data. Weak passwords can easily leave your business’s confidential files susceptible to cyber-attacks and hacks. Secure your IT data center and develop a reliable business continuity plan with the help of Brash Concepts today!