Would you like more tips like this delivered right to your inbox? Click Here
Would you like more tips like this delivered right to your inbox? Click Here
Privacy and security are important to your organization, but they’re even more important to those whom you serve....
The age of social media has let millions of people reconnect and stay up-to-date with family members, friends,...
How important is computer and cyber security? Let’s take a look at some facts to put it in perspective. Did you know...
Passwords and management of those passwords are a big pain – no two ways around it. One website requires a symbol,...
Two-factor authentication (2FA for short), sometimes called multi-factor authentication, is a system in which you must...
Did you know your COMPANY’S bank account doesn’t enjoy the same protections as a personal bank account when it comes...
We often get asked if an organization has passed its PCI compliance requirements for accepting credit cards; is there...
An incident response plan is an organized approach to addressing the aftermath of a security breach or cyber-attack....
It’s just another Tuesday on your way to work and you stopped by your favorite busy coffee shop to get your caffeine...
Do you have guest access on your company WiFi network? Or do you simply give out the same password that your employees...
All parents need to closely monitor their kids’ use of tablets, phones and devices, as well as all social media...
Think fast: what’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince...
Here’s a common scam: you get an e-mail from the boss (or your spouse, parents or other trusted person) asking you to...
Getting rid of old computers or servers? Did you know that the components used in technology equipment are not...
A complex password is a necessity, but hard to remember. And with so many websites requiring a password these days,...
Here are some little-known ways to see if your kid is doing things and visiting sites you don’t want them to: They’ve...
Modern business equipment has radically changed how we conduct everyday business. Do you realize that copiers and...
Never forget that e-mail constitutes a legal record and can be admissible in legal actions, not only in the courtroom,...
With so many access points, from cell phones to laptop and home computers, how can anyone hope to keep their network...
This week, 10 easy tips to mobile phone security: Lock your device with a PIN or password, and never leave it...
Social engineering is big business. What is it? Figuring out who you are and then using that information to make money...
While most businesses understand the importance of backing up their server and files, many forget to back up their...
If a laptop is stolen or lost, and the data is not backed up, you just lost it all. Worst of all, even if you had it...
There are two mistakes we see with usernames and passwords, even if they are GOOD strong ones. The first is using the...
Here’s a disturbing, but very real, tactic for hackers: spying on you via your device’s camera. Some simply watch you...
So you have a big file you need to get over to your printer YESTERDAY and you can’t get it to “send” via e-mail...
If you do online banking, NEVER access your online account with a PC or device that you use to log in to social media...
In a recent incident reported in US news, an office secretary unknowingly gave some of her law firm’s most private...
Want to know what every hacker hopes you believe? “We’re small…nobody wants to hack us.” This is the #1 reason why...
YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses,...
If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data...
No matter how diligent you are about security, there’s always a chance you can get hacked. That’s why you need to put...
If you handle, process or store credit cards in any manner, you are required to comply with PCI DSS, or Payment Card...
A firewall is a device that acts like a security cop watching over your computer network to detect unauthorized access...
When online accessing a banking site or any other application containing sensitive data, make sure you log out of the...
You know you’re guilty of it: using the same password for everything. Believe me, I understand how annoying it is to...
Here’s a tip that just might save your bacon: Set up withdrawal alerts on your bank accounts. Many banks will send you...
The ONLY thing you should use your company’s workstation or PC for is…WORK! Never mix personal web surfing and social...
We’re all guilty of it: connecting to free public WiFi. Whether it’s at the coffee shop, hotel or airport, the...
If you’re using Dropbox, OneDrive, Google Drive or other consumer-grade file sync and sharing cloud applications,...
So you’re in the car on the way home from Starbucks, basking in the glow of consuming your triple-shot, low-foam,...
Like it or not, device manufacturers LOVE to stuff your brand-new PC, tablet or phone full of “free” applications...
There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a...
Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling...
The “Dark Web” or “Deep Web” is a part of the World Wide Web we know and love that is ONLY accessible via a special...
A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file)...
Not too long ago, the WannaCry ransomware attack was all over the news, infecting over 400,000 computers. The threat...
You’re working at your computer when all of the sudden – BAM! – you get a pop-up notification that your PC is infected...
A weak password is still one of the most common ways hackers break in. Thanks to sophisticated brute-force-attack...
If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal...
Did you know your COMPANY’S bank account doesn’t enjoy the same protections as a personal bank account when it comes...