Avoiding Risks as a SMB
Top Security Risks to Your Small Business Original Article Courtesy of The Hartford, Small Biz Ahead Target’s 2013 data breach cost the company $250 million in damages after hackers managed…
Keep Reading...Remote workers increase ransomware threats
Ransomware is an even greater threat Original Article Courtesy of Kaspersky The world has been turned on its head, and the universal shift to remote working has radically altered the…
Keep Reading...Videoconferencing Security Problems
How secure are the most popular videoconferencing apps? Original article courtesy of Kaspersky Choose the app that suits you best There is no such thing as a perfectly secure videoconferencing…
Keep Reading...Microsoft Teams Quick Start Guide
The Basics of Microsoft Teams Quick Start Guide Provided by Microsoft Teams is a hub for collaboration in Microsoft 365 – integrating people, content and tools for your team: Chat…
Keep Reading...Is it safe to use Zoom?
Yes — Zoom is safe, if you know how to set it up properly. First, some background. As you may know, Zoom’s popularity has soared over the past couple of…
Keep Reading...Cybersecurity begins with physical security
Physical Security Information Courtesy of Federal Trade Commission Cybersecurity begins with strong physical security. Lapses in physical security can expose sensitive company data to identity theft, with potentially serious consequences.…
Keep Reading...How to Keep Zoom Chats Private
A few simple steps to make Zoom safe and secure Original article courtesy of Wired With so many people stuck inside, Zoom has become the default video chat platform for…
Keep Reading...FBI Recommended Passwords
Password Length over Complexity Original article published in Homeland Security Today, hstoday.us We all use passwords. We use them for our phones, our computers, our e-mail, and just about every…
Keep Reading...Technology Wellness Checklist
Business Technology Checklist Given how quickly businesses have needed to adapt their work environments, this is a wellness checklist for your business technology – remote workers, business phones, email, and…
Keep Reading...Work-from-Home Response a Boon for Cybercriminal Exploitation
Article Highlight: Thinking Beyond the Coronavirus Digital transformation is dominated by nebulous perimeters, distributed workforces, global connections, artificial intelligence-driven decision-making and critical systems moving to the public cloud, and these…
Keep Reading...