<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.fgmts.com/blogs/security/feed" rel="self" type="application/rss+xml"/><title>FGM Technology Services - Blog , Security &amp; Compliance</title><description>FGM Technology Services - Blog , Security &amp; Compliance</description><link>https://www.fgmts.com/blogs/security</link><lastBuildDate>Sun, 08 Feb 2026 16:51:09 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Three signs that your business data is at risk]]></title><link>https://www.fgmts.com/blogs/post/three-signs-that-your-business-data-is-at-risk</link><description><![CDATA[According to IBM, the average cost of a data breach in 2025 is $4.4 million. Sound scary? It is! Here are three signs that your business data is at risk.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uvVKyS7ARoy_nqJ2X3Lngg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_AjuzAMHFTrK_RE4ait_5Dw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_kXYRJOU5TDaU3-uDaOar2Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qzjYqyevTzuQPMGfMj_b9A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="text-align:left;"><div style="text-align:left;">Data security and privacy is one of the biggest risks for businesses today. However, it rarely gets the attention it deserves. Unfortunately, it is common for small businesses to not have a proper cyber security plan or controls in place. While it may not seem necessary most of the time, all it takes is one incident for a business to be catastrophically impacted.&nbsp;<span style="font-weight:bold;"><br/></span></div><div style="text-align:left;"><span style="font-weight:bold;"><br/></span></div><div style="text-align:left;"><span style="font-weight:bold;">According to <a href="https://www.ibm.com/reports/data-breach" title="IBM" target="_blank" rel="nofollow noreferrer noopener"><span style="text-decoration:underline;">IBM</span></a>, the average cost of a data breach in 2025 is $4.4 million.&nbsp;</span>Sound scary? It is! Here are three signs that your business data is at risk.&nbsp;</div><div style="text-align:left;"><br/></div><h4 style="text-align:left;">1. You don't have someone responsible for information security</h4><div style="text-align:left;">Every business, no matter how small, should choose someone to be responsible for information security. This could be an employee or a third-party company (such as FGM Technology Services). Ideally, this should be in writing somewhere, such as an information security policy.&nbsp;</div><div style="text-align:left;"><br/></div><div style="text-align:left;">The actual scope of this person's role can vary according to the business' size, budget, and needs. It may be as simple as knowing who to contact if a cyber security incident occurs. Not every business can afford the most comprehensive security systems or controls, and that's okay. The most important thing is that someone is responsible for information security and owns it.</div><div style="text-align:left;"><br/></div><h4 style="text-align:left;">2. You don't have an incident response plan or data backups</h4><div><div>Every business should have an incident response plan and data backups. If you don't, please <a href="/contact" title="contact us" rel=""><span style="text-decoration:underline;">contact</span></a>&nbsp;FGM Technology Services now.&nbsp;</div><div><br/></div><div>The incident response plan doesn't need to be especially detailed or comprehensive. As mentioned in the last section, it could be as simple as specifying who to contact (hint: FGM Technology Services) in the event of a cyber security incident.&nbsp;</div><div><br/></div><div>Data backups are critical for recovery from a cyber security incident. With proper data backups, your organization can save a ton of time and money in the event they are needed. Please trust us, you'll sleep better at night knowing that your data is backed up and safe.</div></div><div style="text-align:left;"><br/></div><h4 style="text-align:left;">3. You don't partner with FGM Technology Services</h4><div>This should have been first on the list. If you don't partner with FGM Technology Services, then you're missing out! Not only will FGM Technology Services help protect your data, but it can be done in an affordable way that doesn't break your budget. FGM Technology Services won't try to up-sell you for the sake of profit. It's understood that every business is different, and sometimes a simple approach to information security is better.&nbsp;</div><div><br/></div><div>Please reach out via phone or email. Let's have a conversation and see if a partnership makes sense for you.&nbsp;</div><div style="text-align:left;"><br/></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 07 Sep 2025 10:54:15 -0600</pubDate></item><item><title><![CDATA[Do you need  a VPN?]]></title><link>https://www.fgmts.com/blogs/post/do-you-need-a-vpn</link><description><![CDATA[VPNs are gaining popularity in the consumer space in recent years. Many people may wonder if a VPN is now a necessity. You might be surprised to see our recommendation.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_jAd4sV3iREW6zQsGDDxkcw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_TIrDJBoiSNOqJd2RCAVu5A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_btB1QjHmSW-1S0wXi688_A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Y8G2sRWAR6mMbj3KyAxs8w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;">It seems that there are VPN advertisements or commercials everywhere now. Each one of them seems to promise similar things: data security, privacy, safety, and more. They also seem to include unsettling or scary information about data breaches, identify theft, and more. I would guess that you have seen at least one of these ads recently, and they have likely made you wonder if you need a VPN.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">I'm here to tell you that you probably don't need a VPN.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">What is a VPN?&nbsp;</span><br/>In it's simplest form, a VPN encrypts and re-routes your internet connection through another server (which is hosted by the VPN provider). The purpose of this is to add an extra layer of encryption and privacy as you interact with the internet.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">VPNs are most commonly used by companies to restrict access to resources, connect secure networks between office sites/locations, and segment their networks. However, VPNs have gained popularity for consumers in recent years, as consumer focus on privacy has increased.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">What are the benefits?</span></p><p style="text-align:left;">Some of the main benefits of a VPN include:&nbsp;</p><ul><li style="text-align:left;">Ensuring all internet traffic is encrypted.</li><li style="text-align:left;">Making it harder to track online activity.&nbsp;</li><li style="text-align:left;">Routing traffic through another location or geography.</li><li style="text-align:left;">Securely connecting remote resources together.</li></ul><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">That sounds great, do I need one?&nbsp;</span></p><p style="text-align:left;">VPNs undoubtedly provide security and privacy benefits. However, it is important to weigh the benefits against the cost. A good VPN service will cost money. It will also require some setup and configuration to operate properly.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">It's also important to remember that VPNs do not protect you from all cyber risks. Additionally, a VPN will not make you fully anonymous when online. For example, the VPN provider will have access to your website traffic, and sites like Facebook, TikTok, etc. can still monitor and track you if you login to them.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">In reality, there are other, more affordable options that can better improve your online security. These include:&nbsp;</p><ul><li style="text-align:left;">Enabling multi-factor authentication (<a href="https://www.fgmts.com/blogs/post/one-thing-that-improves-online-account-security-by-99" title="read more" target="_blank" rel="" style="text-decoration-line:underline;">read more</a>).</li><li style="text-align:left;">Only accessing sites using HTTPS.&nbsp;</li><li style="text-align:left;">Using anti-virus and anti-malware software.</li></ul><div style="text-align:left;"><br/></div><div style="text-align:left;"><div>If you're still not sure, or if you'd just like to talk through your concerns and options, please <a href="/contact" title="contact us" target="_blank" rel="" style="text-decoration-line:underline;">contact</a>&nbsp;FGM Technology Services. Let's have a good conversation about information security best practices!&nbsp;</div><div><br/></div><div><span style="font-weight:bold;">Further Reading</span></div><div><ul><li><a href="https://www.cnet.com/tech/services-and-software/dont-fall-for-these-7-vpn-myths/" title="Don't Fall for These 7 VPN Myths" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Don't Fall for These 7 VPN Myths</a>&nbsp;(CNET)</li><li><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/common-vpn-myths-debunked" title="Common VPN Myths Debunked" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Common VPN Myths Debunked</a> (Bitdefender)</li></ul></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 07 Aug 2025 06:00:00 -0600</pubDate></item><item><title><![CDATA[What to do if your online account was hacked]]></title><link>https://www.fgmts.com/blogs/post/what-to-do-if-your-online-account-was-hacked</link><description><![CDATA[Yes, this is a scary experience. But we can help you work through it.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_U0cQyze5SfatJ43HJvmeYw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_t4VxSnZYQ8CDBR_KRZ3ehg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cOVclSrSSEqJmL83sgLoiA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_eWobfEZzSEin7yK8mFD7sA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;">&quot;Help! My online account was hacked. What should I do?&quot;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">We've all experienced that stomach drop feeling when we realize that something is wrong. When your online account has been hacked or compromised, it can feel like the end of the world. However, now that you know something is wrong, you can act on it. Follow the steps below to get back online, and keep in mind that you can always <a href="/contact" title="contact us" target="_blank" rel="" style="text-decoration-line:underline;">contact</a>&nbsp;FGM Technology Services for questions, guidance, or assistance.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">1. Take a deep breath</span></p><p style="text-align:left;">The first, and most important thing, is to take a deep breath. You're not the first person to experience this problem, and you won't be the last. Panic will probably just make things worse. So take a deep breath, grab a cup of coffee, and let's get to the next step.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">2. Assess the scope of the situation</span></p><p style="text-align:left;">Next, it's important to figure out how much of your account, or accounts, has been impacted. For example, ask yourself the following questions:</p><ul><li style="text-align:left;">How do I know my account has been hacked? If I received a text or notification, can it be trusted?<br/></li><li style="text-align:left;">How many of my accounts have been impacted?&nbsp;</li><li style="text-align:left;">Do I still have access to my account? Or am I locked out?<br/></li></ul><p style="text-align:left;"><br/></p><p style="text-align:left;">Sometimes a notification that you have been hacked is actually the attackers attempting to access your account. For example, imagine that you get a text or a pop up message stating your account has been hacked and that you should urgently call a number. This could be a scam. Calling that number may route you to someone who asks for your password or asks you to download and install something, thus providing them with access to your account or device.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">It's important to take a step back and figure out whether you can trust the source of the notification. When in doubt, look up the actual company phone number and contact them. Or you can always <span style="text-decoration-line:underline;"><a href="/contact" title="contact us" target="_blank" rel="">contact</a></span>&nbsp;FGM Technology Services&nbsp;for assistance.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">3. Reset your password (if you can) and delete any downloaded files/programs</span></p><p style="text-align:left;">If you still have access to your account, then the next step should be to reset your password. This ensures that whoever accessed your account no longer has the correct password. Once this is done, you should be able to move on to the next step.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">If you do not have access to your account, or your locked out, then you should try to use the &quot;forgot my password&quot; option when logging in (if there is one). If that is not available, or it is not working, then you will need to contact the account provider and ask for their assistance.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">After changing your password, it's also a good idea to delete any suspicious files or programs that you may have recently downloaded. This is a precaution to ensure there aren't any malicious files still stored or running on your device. If you still have concerns, please <span style="text-decoration-line:underline;"><a href="/contact" title="contact us" target="_blank" rel="">contact</a></span>&nbsp;FGM Technology Services for a more thorough review and investigation.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">4. Assess the damage and begin cleanup</span></p><p style="text-align:left;">Once you have changed your password and gained (or regained) access to your account, then the next step is to assess the damage. How much damage was done, or could have been done? Once you have thought about it, it's time to begin reverting or cleaning up after the attackers.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">For example, if your social media account was hacked, then you should review and delete any recent posts or messages that the attackers may have sent. It is also recommended to notify your online friends or connections that your account was recently hacked, so they can be extra cautious of any suspicious messages they may have received (or will receive).&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">If your hacked account involved or contained any financial information, then you should contact your financial institutions to notify them of the situation. This will ensure that your financial institutions are aware and can help protect you, as necessary.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">5. Improve your online account security</span></p><p style="text-align:left;">Finally, now that you have resolved the immediate concern, it is important to think about what happened and how you can better protect yourself in the future. For example, the following actions can all help reduce the chances of having your account hacked or compromised:&nbsp;</p><ul><li style="text-align:left;">Enable multi-factor authentication on your accounts (<a href="https://www.fgmts.com/blogs/post/one-thing-that-improves-online-account-security-by-99" title="read more" target="_blank" rel="" style="text-decoration-line:underline;">read more</a>).</li><li style="text-align:left;">Closely review the sender of an email before clicking on any links or attachments.</li><li style="text-align:left;">Don't navigate to suspicious websites or open suspicious links, attachments, or files.</li><li style="text-align:left;">Use a different password for each online account.</li><li style="text-align:left;">Enable security notifications on your accounts, where possible.</li></ul><p style="text-align:left;"><br/></p><p style="text-align:left;">When in doubt, please <a href="/contact" title="contact us" target="_blank" rel="" style="text-decoration-line:underline;">contact</a>&nbsp;FGM Technology Services. Let's get you a customized quote and address your questions, concerns, or issues.</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 30 Jun 2025 21:15:31 -0600</pubDate></item><item><title><![CDATA[One change that will improve online account security by 99%]]></title><link>https://www.fgmts.com/blogs/post/one-thing-that-improves-online-account-security-by-99</link><description><![CDATA[Do this one thing, and you can feel a lot better about the security of your online accounts and data.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_VXsvUfzfR7KrVxcNA10IvQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_YiKAZRESSZ2onQzPZpIIjw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_LlR9bZtLTly3zJfA8eGOLQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Ilw5znoCTRWQFwXHEUHC2g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;">What is the most important change that can be made to secure online accounts? The short answer is multi-factor authentication (MFA).&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Online account security can seem overwhelming, especially when you're not sure who to trust. While security is a complex topic, multi-factor authentication is one change that will have a profound impact on online account security. In fact, <a href="https://www.microsoft.com/en-us/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Microsoft states that enabling multi-factor authentication will prevent 99.9% of attacks on accounts</a>.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">What is multi-factor authentication?&nbsp;</span></p><p style="text-align:left;">Multi-factor authentication, also known as two-factor authentication (2FA), is a process in which two or more verification methods are needed to login to an account. For example, someone using MFA might need to do the following to login to their account:&nbsp;</p><ol><li style="text-align:left;">Type in their password.</li><li style="text-align:left;">Type in a code that was sent to their phone number, email, or authenticator app.</li></ol><div style="text-align:left;"><br/></div><div style="text-align:left;">When using MFA, a password by itself will not grant access to an account. While the additional step may seem cumbersome, it vastly improves the security of an account. Even if an attacker has an account password, they will not be able to access the account unless they can also compromise the other verification methods.</div><div style="text-align:left;"><br/></div><div style="text-align:left;"><span style="font-weight:bold;">How to turn on multi-factor authentication</span></div><div style="text-align:left;">Every application and system is different. However, the steps to turn on MFA are usually similar. If an account provider or system offers MFA as a security option, it can usually be found under account settings. Below are some helpful resources for popular applications and systems:</div><div style="text-align:left;"><ul><li><a href="https://www.facebook.com/help/148233965247823" title="How two-factor authentication works on Facebook" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">How two-factor authentication works on Facebook</a>&nbsp;(facebook.com)</li><li><a href="https://support.google.com/accounts/answer/185839?hl=en&amp;co=GENIE.Platform%3DDesktop" title="Turn on 2-Step Verification" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Turn on 2-Step Verification</a>&nbsp;(google.com)<br/></li><li><a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=G3PWZPU52FKN7PW4" title="What is Two-Step Verification?" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">What is Two-Step Verification?</a> (amazon.com)<br/></li></ul></div><div style="text-align:left;"><br/></div><div style="text-align:left;"><span style="font-weight:bold;">Still have questions?</span></div><div style="text-align:left;"><div>For any other questions or concerns, please feel free to <a href="/contact" title="contact FGM Technology Services" rel="" style="text-decoration-line:underline;">contact FGM Technology Services</a> for assistance. You'll be happy you did!&nbsp;</div></div><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">Further reading:&nbsp;</span></p><ul><li style="text-align:left;"><a href="https://www.microsoft.com/en-us/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/" title="One simple action you can take to prevent 99.9 percent of attacks on your accounts" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">One simple action you can take to prevent 99.9 percent of attacks on your accounts</a>&nbsp;(microsoft.com)</li><li style="text-align:left;"><a href="https://www.onelogin.com/learn/what-is-mfa" title="What is Multi-Factor Authentication (MFA) and How Does it Work?" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">What is Multi-Factor Authentication (MFA) and How Does it Work?</a>&nbsp;(onelogin.com)<br/></li></ul></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 22 Jun 2025 09:00:00 -0600</pubDate></item></channel></rss>