/News/

Your Guide to Having “The Talk” with Your Team about Passwords

By | 2017-09-18T11:37:24+00:00 September 18th, 2017|News|

Protecting business accounts with strong passwords is an important part of any company's security strategy. However, if you simply tell your team to avoid using weak passwords like "123456" or "qwerty" because weak credentials can lead to data breaches, they will probably say "Okay" and then forget what you told them the next time they [...]

Data Backups vs. Replication: What Does Your Business Need?

By | 2017-09-18T11:37:59+00:00 September 16th, 2017|News|

Data backups and replication aren't one and the same. There are important differences in what they are used for and how they are set up. Only by understanding the differences can you determine whether your business needs just one solution or both of them. Data Backups Data backups involve copying both critical and non-critical data [...]

How Former Employees Can Pose a Big Threat to Your Data

By | 2017-09-15T13:27:41+00:00 September 13th, 2017|News|

Data breaches instigated by former employees do not gain as much media exposure as those caused by cybercriminals. However, these insider attacks can pose a significant threat to companies' data as well as their bottom line, as the following examples demonstrate: Over a two-year period, the co-owner of an engineering firm accessed the servers of [...]

What You Need to Know about Adobe Ending Support for Flash

By | 2017-09-11T13:56:40+00:00 September 11th, 2017|News|

For two decades, Adobe Flash has worked behind the scenes, letting people watch animations, view and listen to streaming content, and play interactive games through their web browsers. The Flash platform delivers the content, while the Flash Player (a web browser plugin) enables users to access it. However, the end is near for Flash. Adobe [...]

Cybercriminals Are Creating Fake Banking Websites That Look Like the Real Deal

By | 2017-09-11T17:01:58+00:00 September 9th, 2017|News|

Banking trojans have been around for years. If your computer is infected, the trojan waits until you visit your online banking website. When you do, it redirects you to a malicious website that looks like your bank's site. If you enter your banking credentials, they will fall into a cybercriminal's hands.In the past, you could [...]

What You Need to Know about the Virtual Desktops Feature in Windows 10

By | 2017-08-30T13:50:58+00:00 September 7th, 2017|News|

Windows 10 has many new features, one of which is the ability to create virtual desktops. Although Microsoft offered this functionality in the past, it was only available as an add-on program. As a result, most Windows users are not familiar with what virtual desktops are and how to use them. What Are Virtual Desktops? [...]

11 Ways to Secure Your Business’s Wireless Network

By | 2017-08-30T12:52:03+00:00 August 30th, 2017|News|

Wireless networks are popular in small and midsized businesses because they are easy to set up and convenient to use. However, if a wireless network is not properly secured, hackers within range can access it and infiltrate your network. Here are eleven ways you can lock down your business's wireless network and keep hackers at [...]

5 Myths about Ransomware Debunked

By | 2017-08-21T15:12:18+00:00 August 21st, 2017|News|

In May 2017, the WannaCry ransomware infected more than 230,000 computers in over 150 countries, making it the largest cyberextortion scheme to date, according to CNET. WannaCry has one redeeming value, though. It is serving as a wake-up call to business leaders who have not been taking this type of threat seriously. Their lack of [...]

The Pros and Cons of Moving Your Email Services to the Cloud

By | 2017-08-21T14:33:53+00:00 August 21st, 2017|News|

Email is an essential communication tool for most businesses. While email services have traditionally been provided on-premises, an increasing number of companies are moving their email services to the cloud. Almost 60 percent of businesses worldwide now use either Microsoft Office 365 or Google G Suite, according to the Bitglass 2016 Cloud Adoption Report. Office [...]

How Ready Are You For GDPR?

By | 2017-08-17T17:42:57+00:00 August 15th, 2017|News|

Does your company have a Cyber Security Policy? A Company Cyber Security Policy sets out to preserve the security of your data and technology infrastructure. All businesses should have a security policy in place that is regularly assessed, updated as necessary and shared across the entire business, ensuring that all staff comply with that policy. What password [...]