IT Security Tips

The on-screen keyboard: use it!
One of the most notorious spyware/malware targets is your keyboard – keylogger software has been around for ages. The...

Privacy – it’s just smart business!
Privacy and security are important to your organization, but they’re even more important to those whom you serve....

Staying secure in a social media world
The age of social media has let millions of people reconnect and stay up-to-date with family members, friends,...

Did you know?
How important is computer and cyber security? Let’s take a look at some facts to put it in perspective. Did you know...

Why do I need so many passwords???
Passwords and management of those passwords are a big pain – no two ways around it. One website requires a symbol,...

Two-factor what?
Two-factor authentication (2FA for short), sometimes called multi-factor authentication, is a system in which you must...

Set this up for your bank account to prevent fraud
Did you know your COMPANY’S bank account doesn’t enjoy the same protections as a personal bank account when it comes...

Is my PCI compliance good enough to serve as a network cyber security audit?
We often get asked if an organization has passed its PCI compliance requirements for accepting credit cards; is there...

Do you need an “incident response” plan?
An incident response plan is an organized approach to addressing the aftermath of a security breach or cyber-attack....

Should your laptop be encrypted?
It’s just another Tuesday on your way to work and you stopped by your favorite busy coffee shop to get your caffeine...

Should you allow guests to access your WiFi network?
Do you have guest access on your company WiFi network? Or do you simply give out the same password that your employees...

Three things about cyberspace you should CONSTANTLY remind your kids about
All parents need to closely monitor their kids’ use of tablets, phones and devices, as well as all social media...

POP QUIZ: You’re hacked…what do you do?
Think fast: what’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince...

Is this request really from the boss?
Here’s a common scam: you get an e-mail from the boss (or your spouse, parents or other trusted person) asking you to...

Don’t just throw out that old computer
Getting rid of old computers or servers? Did you know that the components used in technology equipment are not...

NEVER use the same password twice
A complex password is a necessity, but hard to remember. And with so many websites requiring a password these days,...

Three sneaky ways to know your kids are up to no good online
Here are some little-known ways to see if your kid is doing things and visiting sites you don’t want them to: They’ve...

Your copier is spying on you…
Modern business equipment has radically changed how we conduct everyday business. Do you realize that copiers and...

Be VERY careful of what you put in any e-mail
Never forget that e-mail constitutes a legal record and can be admissible in legal actions, not only in the courtroom,...

What the heck is an AUP…and why do you want it?
With so many access points, from cell phones to laptop and home computers, how can anyone hope to keep their network...

The Top 10 list for keeping your mobile phone secure
This week, 10 easy tips to mobile phone security: Lock your device with a PIN or password, and never leave it...

Lie, lie, lie!
Social engineering is big business. What is it? Figuring out who you are and then using that information to make money...

Are you backing up your WEBSITE?
While most businesses understand the importance of backing up their server and files, many forget to back up their...

Keep sensitive and important data off DEVICES and in the cloud
If a laptop is stolen or lost, and the data is not backed up, you just lost it all. Worst of all, even if you had it...

How even a STRONG password can work against you
There are two mistakes we see with usernames and passwords, even if they are GOOD strong ones. The first is using the...

Why you might want to cover up your webcam with a sticker
Here’s a disturbing, but very real, tactic for hackers: spying on you via your device’s camera. Some simply watch you...

Don’t download ANYTHING you’re not authorized to download
So you have a big file you need to get over to your printer YESTERDAY and you can’t get it to “send” via e-mail...

Bank online? Do this ONE thing…
If you do online banking, NEVER access your online account with a PC or device that you use to log in to social media...

This can happen at work OR at your home
In a recent incident reported in US news, an office secretary unknowingly gave some of her law firm’s most private...

If you’ve ever said this, you’re ASKING to be hacked!
Want to know what every hacker hopes you believe? “We’re small…nobody wants to hack us.” This is the #1 reason why...

The #1 threat to your security is…
YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses,...

Three essential rules for all cloud applications
If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data...

You’ve been HACKED! What’s the first thing you should do?
No matter how diligent you are about security, there’s always a chance you can get hacked. That’s why you need to put...

A WARNING if you handle, process or store client credit cards
If you handle, process or store credit cards in any manner, you are required to comply with PCI DSS, or Payment Card...

Your firewall is USELESS unless…
A firewall is a device that acts like a security cop watching over your computer network to detect unauthorized access...

Don’t just close your browser!
When online accessing a banking site or any other application containing sensitive data, make sure you log out of the...

Make THIS password different from everything else
You know you’re guilty of it: using the same password for everything. Believe me, I understand how annoying it is to...

Set up bank alerts – NOW!
Here’s a tip that just might save your bacon: Set up withdrawal alerts on your bank accounts. Many banks will send you...

Don’t do THIS on your work laptop or PC
The ONLY thing you should use your company’s workstation or PC for is…WORK! Never mix personal web surfing and social...

DON’T use public WiFi until you read this
We’re all guilty of it: connecting to free public WiFi. Whether it’s at the coffee shop, hotel or airport, the...

The DANGERS of Dropbox and other file sync apps
If you’re using Dropbox, OneDrive, Google Drive or other consumer-grade file sync and sharing cloud applications,...

What to do BEFORE you go to Starbucks
So you’re in the car on the way home from Starbucks, basking in the glow of consuming your triple-shot, low-foam,...

REMOVE these from your laptop, tablet or smartphone
Like it or not, device manufacturers LOVE to stuff your brand-new PC, tablet or phone full of “free” applications...

If you installed it, you must update it!
There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a...

Bookmark the LEGITIMATE websites you frequently visit
Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling...

What is the “Dark Web” anyway?
The “Dark Web” or “Deep Web” is a part of the World Wide Web we know and love that is ONLY accessible via a special...

How to spot a phishing e-mail
A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file)...

How to avoid being a victim of ransomware
Not too long ago, the WannaCry ransomware attack was all over the news, infecting over 400,000 computers. The threat...

If this type of alert pops up, DON’T click on it!
You’re working at your computer when all of the sudden – BAM! – you get a pop-up notification that your PC is infected...

The #1 way a hacker will get you is…
A weak password is still one of the most common ways hackers break in. Thanks to sophisticated brute-force-attack...

Working from home? DON’T DO THIS!
If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal...

The shocking truth about bank fraud
Did you know your COMPANY’S bank account doesn’t enjoy the same protections as a personal bank account when it comes...
Latest Blog Post
How do I lock or log off my computer?
Windows 10 and other operating systems store all data on a PC based on the logged in user account. It is very common, in family and in public areas, for multiple users to use a single PC. Even one person can have multiple user accounts on a same PC for carrying out...
Summer Travel Tech Tips
If you’re thinking of vacationing this summer, you may be more focused on the fun stuff rather than keeping your tech and data safe. Being on vacation increases some risks. Devices could be lost or stolen, you may fall victim to hackers or...
Scam to watch for: Classified ads buyer asks for “code” which is your 2FA code.
If someone (not a company) asks you to ‘send them a code’ they are probably trying to scam you. Today we have a new type of scam which is happening quite frequently to friends buying and selling on internet classifieds like Craigslist, FB...
Online Romance Scams: Protect your loved ones from “Love”
HOW TO AVOID ONLINE ROMANCE SCAMS If you think you are being scammed It’s well known that people online aren’t always as they appear. However, tens of thousands of internet users fall victim to online romance scams each year, and it...
Cybersecurity Awareness Month – Week 4: Prioritizing Cybersecurity in a Hybrid Workplace
In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to...
IT Security Tips
Introduction to Brightgauge
Network Doctor Service Ticket Process
https://youtu.be/qKs0dtMuknU
The Top 8 Reasons Every Company Needs IT Support
We have assembled the main eight reasons why you need professional IT support for your business. Professional IT...

Summer Travel Tech Tips
If you’re thinking of vacationing this summer, you may be more focused on the fun stuff rather than keeping...

Why Use Roaming Client with Cisco Umbrella?
With employees moving more permanently to remote work, you need a content filtering solution that works no matter...

Scam to watch for: Classified ads buyer asks for “code” which is your 2FA code.
If someone (not a company) asks you to ‘send them a code’ they are probably trying to scam you. Today we have a new...

Online Romance Scams: Protect your loved ones from “Love”
HOW TO AVOID ONLINE ROMANCE SCAMS If you think you are being scammed It’s well known that people online...

Case Study: Mastering IT separation
So you’ve decided to split your business into separate parts, and you want those parts to be owned entirely...

Living Well: Lets Get Tech Smart!

Shadow IT: How Your Company’s Data Is Silently Being Leaked Online
Here’s a growing trend creeping into organizations of all industries and sizes: Shadow IT. Shadow IT is the use of...

Network Doctor Joins Forces with SNC Squared
Deal is crucial next step in unique expansion strategy Englewood Cliffs, NJ, December 1, 2021. Network Doctor, one of...

Case study: Updated IT Infrastructure Makes Technology Innovation Possible
Nothing lasts forever, and for any business, keeping up with and staying ahead of the competition means having to...

Local IT company discusses trends they’ve seen regarding data breaches
JOPLIN, Mo. – According to the identity theft resource center, through September 30th of this year, the number of data...

Cybersecurity Awareness Month – Week 4: Prioritizing Cybersecurity in a Hybrid Workplace
In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees,...

Changing your voicemail might help keep you in contact in remote areas with no cell service
JOPLIN, Mo. — If you’ve ever worried about keeping in contact in a remote area with spotty cell service, your...

The on-screen keyboard: use it!
One of the most notorious spyware/malware targets is your keyboard – keylogger software has been around for ages. The...

Cybersecurity Awareness Month – Week 3: Why You Should Consider a Cyber Career
Cybersecurity is one of the hottest sectors today, with new threats and challenges emerging each day. And with that,...

Privacy – it’s just smart business!
Privacy and security are important to your organization, but they’re even more important to those whom you serve....

Cybersecurity Awareness Month – Week 2: 3 Fundamentals for Shoring Up Phishing Defenses
From ransomware to cyber attacks, the cybersecurity space has been as hectic as it has ever been over the last 12-24...

Staying secure in a social media world
The age of social media has let millions of people reconnect and stay up-to-date with family members, friends,...

Do VPN’s prevent hacking? VPN usage for SMB cybersecurity
A VPN essentially acts as a tunnel between the source and destination addresses. It allows users to create a secure...

Cybersecurity Awareness Month – Week 1: Get Familiar with the Cyber Basics
At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already...

Did you know?
How important is computer and cyber security? Let’s take a look at some facts to put it in perspective. Did you know...

Why do I need so many passwords???
Passwords and management of those passwords are a big pain – no two ways around it. One website requires a symbol,...

Two-factor what?
Two-factor authentication (2FA for short), sometimes called multi-factor authentication, is a system in which you must...

Network Doctor Receives the 2021 Ingram Micro Cloud Partner Award
Ingram Micro Cloud honors Network Doctor for its ability to deliver powerful solutions and drive end-user digital...

Set this up for your bank account to prevent fraud
Did you know your COMPANY’S bank account doesn’t enjoy the same protections as a personal bank account when it comes...

Is my PCI compliance good enough to serve as a network cyber security audit?
We often get asked if an organization has passed its PCI compliance requirements for accepting credit cards; is there...

Do you need an “incident response” plan?
An incident response plan is an organized approach to addressing the aftermath of a security breach or cyber-attack....

Should your laptop be encrypted?
It’s just another Tuesday on your way to work and you stopped by your favorite busy coffee shop to get your caffeine...

Cyber attacks are at an all-time high

Should you allow guests to access your WiFi network?
Do you have guest access on your company WiFi network? Or do you simply give out the same password that your employees...

Case study: Phishing leads to Healthcare breach
Recently, one of our healthcare client’s end users (an employee) was the target of a phishing attack that resulted in...

How do I turn on AutoSave?
AutoSave is available when a file is saved to Microsoft OneDrive or SharePoint in Microsoft 365, but you need to...

Three things about cyberspace you should CONSTANTLY remind your kids about
All parents need to closely monitor their kids’ use of tablets, phones and devices, as well as all social media...

Leading design firm leverages Microsoft’s cloud-based virtual desktop with Citrix to maximize power and efficiency
About the client: When it comes to innovative solutions, award-winning design and branding firm ICRAVE does it right....

POP QUIZ: You’re hacked…what do you do?
Think fast: what’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince...

Trending: Coronavirus Phishing Scams and Fake Websites
Recently, there has been a new trending topic in the cybersecurity industry. Coronavirus. Cybercriminals are preying...

Is this request really from the boss?
Here’s a common scam: you get an e-mail from the boss (or your spouse, parents or other trusted person) asking you to...

Consultant, school system officials say hackers pose common woes for institutions
Original article by The Joplin Globe While Joplin officials continue to mostly remain mum, a failure of the city...

Don’t just throw out that old computer
Getting rid of old computers or servers? Did you know that the components used in technology equipment are not...

NEVER use the same password twice
A complex password is a necessity, but hard to remember. And with so many websites requiring a password these days,...

Three sneaky ways to know your kids are up to no good online
Here are some little-known ways to see if your kid is doing things and visiting sites you don’t want them to: They’ve...

Tech Tips for Vacation Travel
Vacation planning usually involves packing a bag, gassing up the car, and doublechecking hotel reservations....

How do I lock or log off my computer?
Windows 10 and other operating systems store all data on a PC based on the logged in user account. It is very common,...
Best Practices for Data Destruction
Data destruction is the process of destroying data stored on tapes, hard disks, flash drives, and all other storage...

Your copier is spying on you…
Modern business equipment has radically changed how we conduct everyday business. Do you realize that copiers and...

Don’t install the leaked version of Windows 11. Here’s why.
In case you hadn’t heard, Windows 11 is coming. Many rumors have been circulating ahead of the big Windows event on...

Be VERY careful of what you put in any e-mail
Never forget that e-mail constitutes a legal record and can be admissible in legal actions, not only in the courtroom,...

What the heck is an AUP…and why do you want it?
With so many access points, from cell phones to laptop and home computers, how can anyone hope to keep their network...

Is Your Internal IT Team Backing Up Your Microsoft 365 Data?
Is your business using Microsoft 365? If so, you're one of 200 million monthly active users leveraging the...

The Top 10 list for keeping your mobile phone secure
This week, 10 easy tips to mobile phone security: Lock your device with a PIN or password, and never leave it...

What is Cyber Liability Insurance and Why do You Need It?
No matter the size of your business, data breaches happen. Sure, cybersecurity is a big part of your defense strategy,...
As Seen On TV
Living Well: Lets Get Tech Smart!
Local IT company discusses trends they’ve seen regarding data breaches
JOPLIN, Mo. – According to the identity theft resource center, through September 30th of this year, the number of data breaches is up 17% compared to 2020. We spoke with a local cyber security expert about what businesses should do to protect their systems....
Changing your voicemail might help keep you in contact in remote areas with no cell service
JOPLIN, Mo. — If you’ve ever worried about keeping in contact in a remote area with spotty cell service, your voicemail message could be the answer. For example, if you’re hiking deep in the woods with low battery power — you could change your voicemail message...
Tech Tips for Vacation Travel
Vacation planning usually involves packing a bag, gassing up the car, and doublechecking hotel reservations. “It’s vacation time, it’s summertime, COVID lifted so we now can start traveling.” Says John Motazedi, SNC2. But to make sure you get the most out of...
Staying online efficient in 2021
2020 was a tough year for many businesses, and 2021 has its own share of challenges too. “We’ve had a lot of companies that have just either had to layoff individuals or they are really having challenges getting some of their staff back after all of 2020 and COVID. So...
New Apple iOS update bolsters user privacy
JOPLIN, Mo. — If you don’t like the idea of tech companies tracking where you go and what you do online, a new Apple update is for you. John Motazedi, SNC Squared, said, “A lot of vendors out there are making substantial amounts of profit from being able to...
How to protect your technology before a disaster
Photos, bank statements, and tax records are just a few of the things at risk if you don’t safeguard your technology before a disaster strikes. Spring storm season means it’s a good idea to be prepared for hail damage, power outages, or worse. Protecting your...
Privacy Settings and Cell Phones
A camera, microphone, and GPS are important functions on your cell phone, but you may not know just how much apps are using information gathered through them. You may need a privacy settings checkup. You likely see your cell phone as something to make your life...
Shortage of microchips causing delivery delays for many products
If you want to buy a car, microwave, refrigerator, or anything else that contains a particular type of electronic component, don’t be surprised if you have to wait a while before it gets delivered. Because of their diminutive dimensions, it’s not hard to figure out...
Justgetmydata.com shows site where personal information may be listed
You probably know there’s a lot of your personal information out on the web and there’s an easy way to see just how much of it there is. John Motazedi, SNC Squared, said, “Years and year of information is out there on these websites and there is not a really easy way...