fbpx

Our Corner

Technology insights written for you

Cyber Security Articles

Categories

Information Technology

Cyber Security
Wireless Technology
Data Backup & Disaster Recovery

Other

Avoid Scams this Holiday Season

With the Holiday Season upon us most of us will be shopping for gifts.  I would like to make a few recommendations to avoid Cybersecurity Scams this Holiday Season. Do not use Public Wi-Fi. I know that it may seem easy to use the Wi-Fi provided at a public location,...

Defend You Network Against Spooky Cyber-Criminals

Cybercrime has increased significantly these past couple of years since the COVID-19 Pandemic occurred; our dependence on technology has increased even more since we were stuck in a lockdown. Technology is ever changing: we depend on technology for many things, from...

All You Need to Know About the Principle of Least Privilege

Did you know that two of the most infamous data breaches on record, namely the ones at Home Depot[i] and Target[ii], occurred due to a compromise of their network credentials? In both cases, hackers used privileged user accounts to access critical business data and...

Pop-off the Fireworks, Check-in on your Cybersecurity

Hello, to all our wonderful Clients and Curious individuals. It is a beautiful time to show our support for our country by participating in Cookouts and BBQs, and watching the fantastic explosive shows in the sky! There is nothing to worry about, Right? Well, not too...

A Blooming Business is the Result of a Healthy Network

A Blooming business is the result of a Healthy Network.  I would like to review a few tips to maintain a Healthy IT Network.  Here are some of the things that you can do to keep your network security intact and help prevent harm from outside threats. 1. Use Strong...

Plant the Seeds of Good Computer Habits

When it comes to technology best practices, password protection is the best place to start if you are concerned about the security of your data.  In your business, rule number one should be to only provide password protected access to systems and data to those...

Holiday Scams are Alive and Well

It’s the most wonderful time of year again. Kids are writing lists, parents are hunting for deals, and scammers are out taking names and wallets. Just as the winter months of the end of the year are the most exciting for Families getting gifts and making people happy....

A New Approach to Strengthen Your Cybersecurity

When it comes to cybersecurity, small and midsize businesses have relied on anti-virus, firewalls, multi-factor authentication, and DNS/Web filters to protect their networks and data from malicious activities.  Each of these services play an important role in reducing...

Fishing vs. Phishing

Fishing and phishing, one is fun to catch and the other catches you! Wait, what? Fishing is of course an all-time favorite hobby of mine but in todays all connected digital world we have to be vigilante to Phishing scams. “What is Phishing” you ask. Well according to...

What is a Comprehensive Cybersecurity Strategy? PART 3 – Protect

Now that you have identified where your most critical systems and data reside, who has access to it, how you protect from loss, and whether or not you must comply with any government, industry, or insurance requirements, you can start work on the next function of the...