Microsoft Teams Quick Start Guide

April 29, 2020
Category: , , , , ,

The Basics of Microsoft Teams Quick Start Guide Provided by Microsoft Teams is a hub for collaboration in Microsoft 365 – integrating people, content and tools for your team: Chat…

Keep Reading...

Is it safe to use Zoom?

April 20, 2020
Category: , , , ,

Yes — Zoom is safe, if you know how to set it up properly. First, some background. As you may know, Zoom’s popularity has soared over the past couple of…

Keep Reading...

Cybersecurity begins with physical security

April 13, 2020
Category: , , ,

Physical Security Information Courtesy of Federal Trade Commission Cybersecurity begins with strong physical security. Lapses in physical security can expose sensitive company data to identity theft, with potentially serious consequences.…

Keep Reading...

How to Keep Zoom Chats Private

April 6, 2020
Category: , , , ,

A few simple steps to make Zoom safe and secure Original article courtesy of Wired With so many people stuck inside, Zoom has become the default video chat platform for…

Keep Reading...

FBI Recommended Passwords

April 6, 2020
Category: ,

Password Length over Complexity Original article published in Homeland Security Today, hstoday.us We all use passwords. We use them for our phones, our computers, our e-mail, and just about every…

Keep Reading...

Technology Wellness Checklist

March 27, 2020
Category: , , , ,

Business Technology Checklist Given how quickly businesses have needed to adapt their work environments, this is a wellness checklist for your business technology – remote workers, business phones, email, and…

Keep Reading...

Work-from-Home Response a Boon for Cybercriminal Exploitation

March 20, 2020
Category: , , ,

Article Highlight: Thinking Beyond the Coronavirus Digital transformation is dominated by nebulous perimeters, distributed workforces, global connections, artificial intelligence-driven decision-making and critical systems moving to the public cloud, and these…

Keep Reading...

17 Types of Cyber Attacks

February 13, 2020
Category: ,

Article courtesy of phoenixnap.com – published originally February 2019 In this article you will learn: What a Cyber Security Attack looks like in 2020 and how to identify one. An…

Keep Reading...

Basic Tips & Advice: Data Privacy

January 23, 2020
Category: , ,

Keep a Machine Clean Keep security software current Protect all devices that connect to the internet Protect your Personal Information Lockdown your login Unique account, unique password Connect with Care…

Keep Reading...

How to Prepare for and Address a Cyberattack

January 28, 2020
Category: ,

As of late, an unfortunate reality is that it’s no longer “if” a cyber incident will occur, but a matter of “when.” A survey of information technology professionals conducted by cybersecurity company…

Keep Reading...