Blog
Stay up to date in new trends in IT and cyber security. Have an interesting topic you'd like our thoughts on? Get in touch with us today!
Cybersecurity in a Changing Work Environment
The Coronavirus has brought about some major change in our daily lives. One change that may be here to stay for some employees is Work from Home. Whether you are in the office, working from home or both, it is important to keep cybersecurity a top priority.
Read More10 Tips to Help Protect Your Organization from Ransomware
Remember ransomware, the malicious software that blocks computer access until a ransom demand is paid? The threat was huge and dominated headlines in the past but seems to have slowed down in recent months. Could the decline in publications citing ransomware as the cause of a data breach or loss of data indicate that cybercriminals have given up on dishing out the malware that locks your system or files until a ransom is paid? The answer is no, not even close.
Read MoreWhat is Two-Factor Authentication (2FA)?
In today’s cyber landscape, having just one strong password on an account just isn’t enough. While we can do a lot to improve the strength of our passwords, having Two-Factor Authentication (2FA) is critical to take that security to the next level.
Read MoreWhat are IoT devices?
IoT (Internet of Things) devices are becoming increasingly popular as their convenience helps individuals and businesses improve many daily functions. Although their intentions are meant to make our lives easier, IoT devices come with many security risks we all should be aware of.
Read MoreWork From Home Tools
COVID-19 has changed the way we work, possibly forever! The United States has seen an unprecedented shift of work moving from the work office to the home office. The WFH acronym was born.
Read MoreWhat is incident response?
Incident response refers to the processes an organization employs to help detect, respond to, and recover from security incidents. It’s essentially an emergency plan with step-by-step guidelines, similar to how most buildings have predefined evacuation routes.
Read MoreWindows 7 End of Life Creates New Opportunities for Scammers
With the surge of businesses switching to remote work during the pandemic, some employees are using personal devices to do their job at home. Make sure that these devices’ operating systems are up-to-date and educate your employees about these possible Windows 7 support scams.
Read MoreWhat is a VPN?
A Virtual Private Network (VPN) creates a secure and private connection, which is especially critical when working remotely. For both personal and professional use, VPNs are a great resource and tool that have evolved over the years to be much more user-friendly.
Read MoreUsing Telehealth During the COVID-19 Crisis
In recent years there has been an increase in the use of telehealth and remote management tools as options for maintaining patient well-being. If you’re not familiar with these, the HHS’ Health Resource & Services Administration (HRSA) defines telehealth as “the use of electronic information and telecommunications technologies to support and promote long-distance clinical health care, patient and professional health-related education, and public health and health administration. Technologies include videoconferencing, the internet, store-and-forward imaging, streaming media, and landline and wireless communications.” These services may be conducted through audio, text messaging or videoconferencing.
Read More