WELCOME TO OUR BLOG

Is it time for cyber-security planning?

The time to start planning for a security threat is BEFORE a cyber-attack occurs…not during! Cyber-security planning should be done continuously, especially as your organization changes.  

By proactively planning and adjusting, you can reduce the risk of significant consequences from technology incidents.

View More »

Should I encrypt the data on my computer?

Imagine being at the airport and going to Starbucks to grab a cup of coffee before you catch your plane. You sit your laptop down to get a straw, and the next thing you know…your laptop is gone!  

View More »

All About Password Refreshes

For any account that you care about protecting, we recommend you change your passwords about once every three months. It’s also important that you don’t reuse passwords or use the same passwords for two different sensitive accounts. 

View More »

Do you allow guests to access your WiFi network?

Do you have guest access on your company WiFi network separate from your main network? Or do you simply give out the same password and access point information that your employees use? If you give out your password, you’re allowing a guest to play in the same sandbox where your staff accesses sensitive data.  What if your guest, knowingly or unknowingly, has been infected with some kind of worm?   

View More »

The Importance of Security Awareness Training

Every organization needs to ask a fundamental question about their staff: Do they know what to do immediately upon discovering a virus, e-mail threat or other cyber-security issue? 

View More »

Don’t just throw away your old computer

Getting rid of old computers or servers? Did you know that the components used in technology equipment are not landfill-safe? On top of the environmental hazards, unprotected e-waste typically contains a lot of confidential and private information.

View More »

Why is it so important to have unique passwords for all your online accounts?

Password complexity is a given in the current age of cyber-threats, data breaches and other security incidents. At the same time, it can be very difficult to manage a series of different passwords for different websites and devices. 

View More »

Make sure your road warriors are productive and secure when working remotely

Do you connect remotely to get some work done in the evenings, weekends or when on the road? For many, the answer is yes.  Technology has provided us with so many ways to be productive anytime and anywhere. 

View More »

Risks from the Internet of Things (IoT)

Modern technology has radically changed how we work and live. Almost everything we take for granted in our daily lives, from the copiers and multi-function printers in our office, to the refrigerators, light bulbs and locks on our doors, are evolving to have broader capabilities using the power of networks to make our lives generally better.

View More »

Don’t overshare

Phishing attacks are designed to exploit the ignorance of end users to get them to perform tasks they wouldn’t otherwise do.  It’s the work of con-men. 

Here’s one example: a secretary gets an e-mail from her boss – who is traveling – to send him scanned copies of all the W2s the company issued at the end of January. The message appears to come from her manager, including having what looks like his actual e-mail address when she looks at in Outlook. 

View More »