Content

IT Security Tips

Should your laptop be encrypted?

It’s just another Tuesday on your way to work and you stopped by your favorite busy coffee shop to get your caffeine fix. You set your tablet down to add the cream and, when you turn back, your laptop is gone. It’s nowhere in sight, nor is the thief who stole it. If...

Should you allow guests to access your WiFi network?

Do you have guest access on your company WiFi network? Or do you simply give out the same password that your employees use? If you give out your password, you’re practically opening the door for anyone to come in and steal private information, infect your private...

POP QUIZ: You’re hacked…what do you do?

Think fast: what’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince wanting to give you a sum of $34 million? Okay, you most likely didn’t reply to that…but let’s suppose you suddenly realize your machine or device has...

Is this request really from the boss?

Here’s a common scam: you get an e-mail from the boss (or your spouse, parents or other trusted person) asking you to send them a copy of employee pay stubs, tax information and files with confidential data such as social security numbers in them; or they’re asking...

Don’t just throw out that old computer

Getting rid of old computers or servers? Did you know that the components used in technology equipment are not landfill-safe? On top of the environmental hazards, unprotected e-waste typically contains a lot of confidential and private information in the form of saved...

NEVER use the same password twice

A complex password is a necessity, but hard to remember. And with so many websites requiring a password these days, users often reuse the same password again and again with different sites. BAD idea. When a big company gets hacked (like LinkedIn, for example), the...

Three sneaky ways to know your kids are up to no good online

Here are some little-known ways to see if your kid is doing things and visiting sites you don’t want them to: They’ve deleted their browsing history. What are they hiding? The ads showing up are questionable. Marketers use retargeting to get you to come back to their...

Your copier is spying on you…

Modern business equipment has radically changed how we conduct everyday business. Do you realize that copiers and multifunction printers are also one of the leading causes of data breaches? They are the one device on the network that commonly does not ever have the...