One of the most prevalent problems that businesses now face are scams known as phishing attacks. When it comes to defending against these attacks, the capability to identify phishing as such is perhaps your greatest asset. Let’s go over a few signs that a message you receive might be a phishing attack. Read More
- Published: 07 Aug 2020
One of the most prevalent problems that businesses now face are scams known as phishing attacks. When it comes to defending against these attacks, the capability to identify phishing as such is perhaps your greatest asset. Let’s go over a few signs that a message you receive might be a phishing attack.
- Published: 03 Aug 2020
In a recent security update, most Android and iOS phones received a new opt-in setting related to the COVID-19 Exposure Notification system. What is this? Is your phone being tracked? Let’s take a deeper look at what is going on.
- Published: 06 Jul 2020
It’s a common myth that Apple computers don’t get viruses. It’s not uncommon for a Mac user to chime in and say, “you should have gotten a Mac,” when a PC user mentions getting a virus or malware. Let’s unpack this myth, and talk a little about how, no matter what technology you have, you
- Published: 03 Jul 2020
There are many security buzzwords that come into play when the technology available to help secure a business is discussed. The problem is that many of these buzzwords sound great but are actually very poor fits to the real needs of most small and medium-sized businesses. Let’s consider how these buzzwords play into the concept
- Published: 29 Jun 2020
The days of the cash-only business are over. It doesn’t matter if your business is a multinational corporation or you cut grass for a living, accepting payment cards is not only convenient for your customers, most of the time it’s the most secure way to get paid. In an effort to protect the personal and
- Published: 15 Jun 2020
We’ve all seen them: the scam emails that are so obviously a scam, you have no idea why a scammer or a cybercriminal would even bother sending them. It just so happens that there is a very good reason that criminals continue to use these transparent attacks, as they have done for centuries.
- Published: 05 Jun 2020
Internet-based companies have access to an audience that, at the very least, are extremely trusting of them. There is an expectation that these businesses will fulfill their promises while also protecting the information that their customers and clients provide to them, but are these expectations well-founded? Let’s consider common collection practices companies deploy and how
- Published: 29 May 2020
With so many people working from home due to stay-at-home orders resulting from the COVID-19 pandemic, IT security may not be at the forefront of users’ minds. Unfortunately, scammers and hackers aren’t unemployed during this time and are still causing havoc for businesses of all sizes. Let’s take a look at cybersecurity during COVID-19.
- Published: 11 May 2020
Video conferencing has been one of the surprise winners of the COVID-19 era. As large percentages of people are asked to distance from others, one solution that has been extremely popular is to have meetings over the Internet. While seemingly the whole world is using video conferencing solutions, for the business, there are other considerations
- Published: 04 May 2020
With remote work becoming a popular option amongst businesses nowadays, concerns and considerations should be raised about how secure the networks being used are: namely, the Wi-Fi connections many have in their homes. Just as in the office, it is important that these networks are properly secured for the good of your business.