Content

Locations

Do VPN’s prevent hacking? VPN usage for SMB cybersecurity

Do VPN’s prevent hacking? VPN usage for SMB cybersecurity

A VPN essentially acts as a tunnel between the source and destination addresses. It allows users to create a secure connection between their network, devices, and the desired destination over the internet. data is encrypted before it enters the tunnel, keeping the...

How do I turn on AutoSave?

How do I turn on AutoSave?

AutoSave is available when a file is saved to Microsoft OneDrive or SharePoint in Microsoft 365, but you need to save or open the file from within Excel, PowerPoint or Word to switch it on. You also need an active Microsoft 365...

How do I lock or log off my computer?

How do I lock or log off my computer?

Windows 10 and other operating systems store all data on a PC based on the logged in user account. It is very common, in family and in public areas, for multiple users to use a single PC. Even one person can have multiple user accounts on a same PC for carrying out...

5 Mistakes to Avoid in Business Continuity Planning

5 Mistakes to Avoid in Business Continuity Planning

Your Business Continuity Plans may look great on paper, but they aren’t worth a thing if you don’t have buy-in from your employees. They need to be informed about their role in the plan; what responsibilities do they have in case of a catastrophic network failure?...

8 Reasons to Purchase Cyber Insurance

8 Reasons to Purchase Cyber Insurance

Cyber insurance is an important way to protect you and your business from cyberattacks that happen regularly across the internet. Here are 8 reasons why you should purchase cyber insurance to protect personal information and private data. 1.  Data Is Not Covered by...

Self-Assessment: How strong is Your Cybersecurity Plan?

Self-Assessment: How strong is Your Cybersecurity Plan?

Anyone who has a small to medium-sized business has “an” IT plan, but per a recent study, only 14% of them rate their own cybersecurity plans as “effective.”  This is alarming when you consider that 43% of small businesses are targeted by cyberattacks. It’s like...

My IT Guy Quit, Now What?

My IT Guy Quit, Now What?

Receiving a resignation letter from your IT manager can set off the panic alarm – and for good reason. Most organizations rely heavily on their IT people to keep their business secure and operational, and picking up where they left off isn’t easy – especially if you...

What Business Executives Want to Know About Cyber Risk

What Business Executives Want to Know About Cyber Risk

Who should you call first after you’ve had a data breach? What should be included in a cyber attack communications response? How can we make sure that everyone knows their role in communicating about a data breach?