WELCOME TO OUR BLOG

Your firewall is USELESS unless...

A firewall is a device that sits on the perimeter of your network, allowing (hopefully) good traffic in and blocking bad traffic. EVERY business and individual concerned with keeping bad guys out needs one.

View More »

Use STRONG passwords!

Thanks to powerful password-cracking software that is readily available online, hackers can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds.
 

View More »

Working from home? DON’T! Until you read this…

If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop – DON’T! Unless your personal device is covered under your organization’s IT support plan and tools, your device could be the one used to introduce a significant cyber-attack or data breach of your organization’s technology.

 

View More »

If this type of alert pops up, DON’T click on it!

You’re working at your computer when all of the sudden – BAM! – you get a pop-up notification that your PC is infected with a virus and you must “click here” to run a scan or install antivirus software.

 

View More »

How to foil ransomware

Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher). The threat was fairly straightforward: Pay us or we’ll delete all your data.

 

View More »

How to spot a phishing e-mail

A phishing e-mail is a bogus e-mail that is carefully designed to trick the end user into looking like a legitimate request for personal information or to get you to click on a malicious attachment from a source you trust.  It is one of the cheapest and most effective ways to compromise end user PCs and accounts.

 

View More »

Never use PERSONAL devices to connect to COMPANY data if you don’t have Mobile Device Management (MDM) and a Bring Your Own Device (BYOD) policy

You have a hard working team who likes to get things done after-hours or on the road – that’s terrific! However, here is something you might not know: you should never access company data, file servers or applications through personal devices and home PCs that are not properly managed by us.

 

Why?

 

View More »

If you installed it, you must update it!

There are countless hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe Flash Player, Java plug in or Google Chrome) to access your computer. 

View More »

Be careful what you have installed on your device

Like it or not, device manufacturers and application publishers LOVE to add bloat that you don’t need to their products. This inevitably creates more security risks AND slows down your device.

 

View More »

What to do BEFORE you go to Starbucks

So you’re in the car on the way home from Starbucks, when you suddenly realize your laptop has gone missing. You drive back frantically hoping you can find it, only to discover it completely missing. What do you do? That depends…

 

View More »