Do you have guest access on your company WiFi network separate from your main network? Or do you simply give out the same password and access point information that your employees use? If you give out your password, you’re allowing a guest to play in the same sandbox where your staff accesses sensitive data. What if your guest, knowingly or unknowingly, has been infected with some kind of worm?
WELCOME TO OUR BLOG
Every organization needs to ask a fundamental question about their staff: Do they know what to do immediately upon discovering a virus, e-mail threat or other cyber-security issue?
Getting rid of old computers or servers? Did you know that the components used in technology equipment are not landfill-safe? On top of the environmental hazards, unprotected e-waste typically contains a lot of confidential and private information.
Password complexity is a given in the current age of cyber-threats, data breaches and other security incidents. At the same time, it can be very difficult to manage a series of different passwords for different websites and devices.
Do you connect remotely to get some work done in the evenings, weekends or when on the road? For many, the answer is yes. Technology has provided us with so many ways to be productive anytime and anywhere.
Modern technology has radically changed how we work and live. Almost everything we take for granted in our daily lives, from the copiers and multi-function printers in our office, to the refrigerators, light bulbs and locks on our doors, are evolving to have broader capabilities using the power of networks to make our lives generally better.
Phishing attacks are designed to exploit the ignorance of end users to get them to perform tasks they wouldn’t otherwise do. It’s the work of con-men.
Here’s one example: a secretary gets an e-mail from her boss – who is traveling – to send him scanned copies of all the W2s the company issued at the end of January. The message appears to come from her manager, including having what looks like his actual e-mail address when she looks at in Outlook.
Imagine a scenario where an office secretary unknowingly gave some of her law firm’s most private data to a gentleman dressed as a Comcast technician. He had bought a Comcast Cable polo shirt off eBay, dressed in khakis with a tool belt, and told the secretary he was there to audit their cable modem specifications and take pictures of the install for quality assurance. Well, that actually happened. It’s not far-fetched.
Routers and firewalls can be confusing. Anybody who wants to have a network with Internet connectivity will typically have at least one in place.
A router like the one you’d purchase at a big-box store is designed to serve the needs of home, not the needs of business. It’s designed to provide basic connectivity and share it with others. They tend to have limited configurations, and for most home users you really don’t need a sophisticated device.