fbpx

Our Corner

Technology insights written for you

Cyber Security Articles

Categories

Information Technology

Cyber Security
Wireless Technology
Data Backup & Disaster Recovery

Other

What is a Comprehensive Cybersecurity Strategy? PART 1 – Intro

Part 1 - An Introduction to the NIST Cybersecurity Framework According to Info Security Magazine, because of the pandemic, 24% of Small and Medium Businesses (SMBs) spend less on cybersecurity despite the increased risks that come with remote work.  According to the...

Tips To Make Your Small / Midsize Business Cyber Safe

According to Info Security Magazine, because of the pandemic, 24% of Small and Medium Businesses (SMBs) spend less on cybersecurity despite the increased risks that come with remote work.  If you consider that, according to the same magazine, 42% of SMBs cite lack of...

WARNING: What Every Contractor Needs To Know About DoD’s New Cybersecurity Interim Rule

If you are doing work for the Federal Government, in particular for the Department of Defense (DoD), you probably know that Cybersecurity compliance has become a major requirement to obtain contracts with DoD.  Up until November of 2020, contractors were required to...

What Is The Dark Web? Is It Dangerous?

First let’s understand what the web is. The Web, also known as the World Wide Web, is a cluster of interconnected computer networks that can be accessed over the internet. Here, you can access websites which are identified by unique URLs (Uniform Resource Locator)...

Private Browsing….Not So Private

You have probably wondered, what is this incognito mode on my browser? Is it really safe? Am I going to get caught if I visit naughty sites? Is my information secured? Yes, it stops websites and advertisers from collecting data during the session. Yes, your user names...

Copyright Image Scam Could Crush Your Company

When a business owner opens an email to read the words, “I came across my images at your website. If you use a copyrighted image without my permission, you need to be aware that you could be sued…”  they may break into a nervous sweat.  That was exactly what Singing...

Risk Less With Contact-less Credit Cards and Mobile Devices

The Timeline Charles Walton is credited for inventing Near Field Communication (NFC) in the form of radio frequency identification (RFID) in the 80’s. This technology allows for the transmittal of radio information to a receiver. At the beginning of the millennium in...

7 Tips to Keep Cyber-Criminals Out While COVID-19 Keeps You In

It is the end of August 2020.  As of today, we have been living under one of many versions of a lock-down across the Country.  We have had to adapt to working remotely, learn how to use Zoom, Teams, and Skype to stay connected to our clients and co-workers, implement...
Is The Pandemic Over??

Is The Pandemic Over??

So, it’s finally been a little over a year since quarantine started in the U.S. Now that we’ve had...