How to Secure Your Data When Using Subcontractors
For today’s tech tip, I want to talk about ways that you can share data and keep it under control whenever you’re using an outsourced third party.
What Are File Permissions?
https://youtu.be/9d75lm62BXM Today I want to talk to you about file permissions and the need to review those on a periodic basis. These are ultimately just files that you create on your computer. Many times, the files are on what we call a network share. The files are under the Q drive or the Z drive. […]
4 Cyber Security Predictions for 2018
If 2017 has shown us anything, it’s that even major organizations can come to a grinding halt due to cyber security attacks. This message probably won’t come as a surprise to many businesses. After all, several big-name brands have suffered embarrassing data breaches in recent years, causing significant financial and reputational damage. What makes this […]
How to Protect Your Wi-Fi Devices from the KRACK Vulnerability
Do you know how to protect your Wi-Fi devices from the most recent KRACK vulnerabilities?
7 Reasons Why You Need an IT Team to Crush Your Competition
Delegating responsibilities can be a challenge for today’s business owner but an IT team is a needed asset for small businesses.
Patch Tuesday
Welcome to this February Patch Tuesday Bulletin. This month brings 6 critical and 7 important severity patches. While there are 7 potential arbitrary code execution flaws, it appears that none of them are being attacked in the wild. Start the month with MS16-009 and MS16-022. These 2 patches deliver updates for Internet Explorer and Adobe […]