4 Ways Computer Security Pros Protect Their Computers
Computer and network security: everyone knows they should be doing it better, but we can all agree on the single-most effective way to keep your computer safe in our digital era is to not turn it on! Unfortunately, that’s not really practical for most people. …
How Much Will A Data Breach Cost You?
How much are you losing if you’re down for an hour? A day? A week? In the event of a data loss, do you really know the cost implications for your business? Research shows that the average cost of a single data breach for SMBs is…
Update your software today. Seriously.
A pair of security flaws were published yesterday, that are most likely present in every device you own, could allow hackers to steal information like passwords and other sensitive and personal information. Dubbed “Spectre” and “Meltdown”, these items take advantage of flaws in the design…
Equifax Scandal: How are you affected?
As you may have seen, cyber criminals have stolen 143 million credit records in the recent hacking scandal at big-three credit bureau Equifax. This dwarfs the multiple Yahoo breaches that recently happened just like our sun does the moon. Social Security Numbers, names, addresses, etc,…
Another day another Worldwide Ransomware Outbreak
Take one look at the graph above and you can see that ransomware is here to stay. New variants to old versions…fine-tuning and tweaking…all finding a way into everything, everywhere…daily. If you think you’re too small, or not in an industry that they would focus…
4 Practical Techniques and Countermeasures to Battle Ransomware
Ransomware is not new, but every time a large outbreak occurs, it becomes the first thing on the minds of individuals and businesses, and rightly so. The latest strain of a ransomware virus, titled “WannaCry”, is the largest outbreak in history, and subsequent versions will…
When and Why You Should Use Remote Support
When and Why You Should Use Remote Support If you’ve ever had a sudden computer problem, you know it can be very stressful. So much of our day-to-day life requires having access to a working computer. Homework, budgeting, bills, even browsing dinner recipes all have…
Quick Tech Tips: 3 Ways to Boost Mobile Security
Set a pin or passcode. This is your first line of defense. If someone wants to access your device, they will first need to break this code. This is not an easy task, and can operate as a deterrent against theft. Some device manufacturers have…
Does Dropbox Make Sense For Your Business?
Does Dropbox Make Sense For Your Business? It seems so easy! Drag your files into a Dropbox folder and you’ve got yourself a file sharing system that brings your business in line with modern expectations. But then again, maybe not. Dropbox has grown to become…
Scam of the Week: It’s Not a WhatsApp Voice Mail!
Criminal hackers are constantly trying to trick people into clicking on links or open attachments they did not ask for. Their new “scam of the week” is to send you an email that looks like it comes from WhatsApp and claims it is a…
Categories
- Business (11)
- Business Continuity (6)
- Cloud (2)
- Compliance (1)
- Cybersecurity (95)
- Data Security (3)
- End of Life (1)
- Focus (1)
- IT Management (12)
- Microsoft (32)
- New Technology (9)
- Office365 (4)
- Online Presence (1)
- Passwords (2)
- Phishing (1)
- Productivity (25)
- Quick Tech Tips (2)
- Security (22)
- Software (6)
- Uncategorized (4)
- Windows (4)
- Windows Server (2)