fbpx

Our Corner

Technology insights written for you

Cyber Security Articles

Categories

Information Technology

Cyber Security
Wireless Technology
Data Backup & Disaster Recovery

Other

A New Approach to Strengthen Your Cybersecurity

When it comes to cybersecurity, small and midsize businesses have relied on anti-virus, firewalls, multi-factor authentication, and DNS/Web filters to protect their networks and data from malicious activities.  Each of these services play an important role in reducing...

Fishing vs. Phishing

Fishing and phishing, one is fun to catch and the other catches you! Wait, what? Fishing is of course an all-time favorite hobby of mine but in todays all connected digital world we have to be vigilante to Phishing scams. “What is Phishing” you ask. Well according to...

What is a Comprehensive Cybersecurity Strategy? PART 3 – Protect

Now that you have identified where your most critical systems and data reside, who has access to it, how you protect from loss, and whether or not you must comply with any government, industry, or insurance requirements, you can start work on the next function of the...

What is a Comprehensive Cybersecurity Strategy? PART 2 – Identify

Cybersecurity is what we do to protect business networks and data from internal and external attacks.  Depending on the type of business you are in, you may store information about your clients, payments, accounting and finance, etc.  Loss of any important data to a...

What is a Comprehensive Cybersecurity Strategy? PART 1 – Intro

Part 1 - An Introduction to the NIST Cybersecurity Framework According to Info Security Magazine, because of the pandemic, 24% of Small and Medium Businesses (SMBs) spend less on cybersecurity despite the increased risks that come with remote work.  According to the...

Tips To Make Your Small / Midsize Business Cyber Safe

According to Info Security Magazine, because of the pandemic, 24% of Small and Medium Businesses (SMBs) spend less on cybersecurity despite the increased risks that come with remote work.  If you consider that, according to the same magazine, 42% of SMBs cite lack of...

WARNING: What Every Contractor Needs To Know About DoD’s New Cybersecurity Interim Rule

If you are doing work for the Federal Government, in particular for the Department of Defense (DoD), you probably know that Cybersecurity compliance has become a major requirement to obtain contracts with DoD.  Up until November of 2020, contractors were required to...

What Is The Dark Web? Is It Dangerous?

Written by Guest Author: Daniel Escalera First let’s understand what the web is. The Web, also known as the World Wide Web, is a cluster of interconnected computer networks that can be accessed over the internet. Here, you can access websites which are identified by...

Private Browsing….Not So Private

You have probably wondered, what is this incognito mode on my browser? Is it really safe? Am I going to get caught if I visit naughty sites? Is my information secured? Yes, it stops websites and advertisers from collecting data during the session. Yes, your user names...

Copyright Image Scam Could Crush Your Company

When a business owner opens an email to read the words, “I came across my images at your website. If you use a copyrighted image without my permission, you need to be aware that you could be sued…”  they may break into a nervous sweat.  That was exactly what Singing...
Work Hard, Play Hard

Work Hard, Play Hard

When you work hard you have to play hard as well. If you’re like me, you work very hard. Whether...

Where Did 2020 Go???

Where Did 2020 Go???

When you hear leap year, you think of the extra day we have in February every four years....