Blog
Stay up to date in new trends in IT and cyber security. Have an interesting topic you'd like our thoughts on? Get in touch with us today!
6 Important IT Policies Any Size Company Should Implement
IT policies are an important part of your IT security and technology management. So, no matter what size your business is, you should have them. We’ll get you started with some of the most important IT policies your company should have in place.
Read More6 Discontinued Technology Tools You Should Not Be Using Any Longer
One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools replace those that are obsolete. Discontinued technology can leave computers and networks vulnerable to attacks.
Read MoreHow Using the SLAM Method Can Improve Phishing Detection
There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing email.
Read MoreDid You Just Receive a Text from Yourself? Learn What Smishing Scams to Expect
In 2020, smishing rose by 328%, and during the first six months of 2021, it skyrocketed nearly 700% more. Phishing via SMS has become a big risk area. Especially as companies adjust data security to a more remote and mobile workforce.
Read MoreHow Often Do You Need to Train Employees on Cybersecurity Awareness?
How often is often enough to improve your team’s cybersecurity awareness? It turns out that training every four months is the “sweet spot.” This is when you see more consistent results in your IT security.
Read MoreHome and Business Security: Why You Should Put IoT Devices on a Guest Wi-Fi Network
During the first six months of 2021, the number of IoT cyberattacks was up by 135% over the prior year.
It’s estimated that over 25% of cyberattacks against businesses involve IoT devices.
Get More Unplugged Laptop Time with These Battery-Saving Hacks
Seeing your laptop’s battery capacity shrink can be frustrating. But there are several things you can do to increase the time you can go without needing to plug it in.
Read More5 Exciting Ways Microsoft 365 Can Enable the Hybrid Office
“Hybrid office” is the new buzzword you’ll hear used in business discussions. It’s the mix of having employees both working at the office and working from home. This has become more than a buzzword and is now the reality for many companies.
Read MoreWhich Form of MFA Is the Most Secure? Which Is the Most Convenient?
How do you protect your online accounts, data, and business operations? One of the best ways is with multi-factor authentication.
It provides a significant barrier to cybercriminals even if they have a legitimate user credential to log in.