Avoiding Risks as a SMB

May 27, 2020
Category: , , , ,

Top Security Risks to Your Small Business Original Article Courtesy of The Hartford, Small Biz Ahead Target’s 2013 data breach cost the company $250 million in damages after hackers managed…

Keep Reading...

Remote workers increase ransomware threats

May 26, 2020
Category: , ,

Ransomware is an even greater threat Original Article Courtesy of Kaspersky The world has been turned on its head, and the universal shift to remote working has radically altered the…

Keep Reading...

Videoconferencing Security Problems

May 4, 2020
Category: , , , , , ,

How secure are the most popular videoconferencing apps? Original article courtesy of Kaspersky Choose the app that suits you best There is no such thing as a perfectly secure videoconferencing…

Keep Reading...

Microsoft Teams Quick Start Guide

April 29, 2020
Category: , , , , ,

The Basics of Microsoft Teams Quick Start Guide Provided by Microsoft Teams is a hub for collaboration in Microsoft 365 – integrating people, content and tools for your team: Chat…

Keep Reading...

Is it safe to use Zoom?

April 20, 2020
Category: , , , ,

Yes — Zoom is safe, if you know how to set it up properly. First, some background. As you may know, Zoom’s popularity has soared over the past couple of…

Keep Reading...

Cybersecurity begins with physical security

April 13, 2020
Category: , , ,

Physical Security Information Courtesy of Federal Trade Commission Cybersecurity begins with strong physical security. Lapses in physical security can expose sensitive company data to identity theft, with potentially serious consequences.…

Keep Reading...

How to Keep Zoom Chats Private

April 6, 2020
Category: , , , ,

A few simple steps to make Zoom safe and secure Original article courtesy of Wired With so many people stuck inside, Zoom has become the default video chat platform for…

Keep Reading...

FBI Recommended Passwords

April 6, 2020
Category: ,

Password Length over Complexity Original article published in Homeland Security Today, hstoday.us We all use passwords. We use them for our phones, our computers, our e-mail, and just about every…

Keep Reading...

Technology Wellness Checklist

March 27, 2020
Category: , , , ,

Business Technology Checklist Given how quickly businesses have needed to adapt their work environments, this is a wellness checklist for your business technology – remote workers, business phones, email, and…

Keep Reading...

Work-from-Home Response a Boon for Cybercriminal Exploitation

March 20, 2020
Category: , , ,

Article Highlight: Thinking Beyond the Coronavirus Digital transformation is dominated by nebulous perimeters, distributed workforces, global connections, artificial intelligence-driven decision-making and critical systems moving to the public cloud, and these…

Keep Reading...