fbpx

Our Corner

Technology insights written for you

Cyber Security Articles

Categories

Information Technology

Cyber Security
Wireless Technology
Data Backup & Disaster Recovery

Other

All You Need to Know About the Principle of Least Privilege

Did you know that two of the most infamous data breaches on record, namely the ones at Home Depot[i] and Target[ii], occurred due to a compromise of their network credentials? In both cases, hackers used privileged user accounts to access critical business data and...

Pop-off the Fireworks, Check-in on your Cybersecurity

Hello, to all our wonderful Clients and Curious individuals. It is a beautiful time to show our support for our country by participating in Cookouts and BBQs, and watching the fantastic explosive shows in the sky! There is nothing to worry about, Right? Well, not too...

A Blooming Business is the Result of a Healthy Network

A Blooming business is the result of a Healthy Network.  I would like to review a few tips to maintain a Healthy IT Network.  Here are some of the things that you can do to keep your network security intact and help prevent harm from outside threats. 1. Use Strong...

Plant the Seeds of Good Computer Habits

When it comes to technology best practices, password protection is the best place to start if you are concerned about the security of your data.  In your business, rule number one should be to only provide password protected access to systems and data to those...

Holiday Scams are Alive and Well

It’s the most wonderful time of year again. Kids are writing lists, parents are hunting for deals, and scammers are out taking names and wallets. Just as the winter months of the end of the year are the most exciting for Families getting gifts and making people happy....

A New Approach to Strengthen Your Cybersecurity

When it comes to cybersecurity, small and midsize businesses have relied on anti-virus, firewalls, multi-factor authentication, and DNS/Web filters to protect their networks and data from malicious activities.  Each of these services play an important role in reducing...

Fishing vs. Phishing

Fishing and phishing, one is fun to catch and the other catches you! Wait, what? Fishing is of course an all-time favorite hobby of mine but in todays all connected digital world we have to be vigilante to Phishing scams. “What is Phishing” you ask. Well according to...

What is a Comprehensive Cybersecurity Strategy? PART 3 – Protect

Now that you have identified where your most critical systems and data reside, who has access to it, how you protect from loss, and whether or not you must comply with any government, industry, or insurance requirements, you can start work on the next function of the...

What is a Comprehensive Cybersecurity Strategy? PART 2 – Identify

Cybersecurity is what we do to protect business networks and data from internal and external attacks.  Depending on the type of business you are in, you may store information about your clients, payments, accounting and finance, etc.  Loss of any important data to a...

What is a Comprehensive Cybersecurity Strategy? PART 1 – Intro

Part 1 - An Introduction to the NIST Cybersecurity Framework According to Info Security Magazine, because of the pandemic, 24% of Small and Medium Businesses (SMBs) spend less on cybersecurity despite the increased risks that come with remote work.  According to the...
Wiper Safety

Wiper Safety

In my last blog I reviewed the importance of keeping your tires properly maintained to include...