The 6 Layers of Email Defense

Img featured 6 layers email defense 1

For today’s Tuesday Tech Tip, I want to talk about the six layers of email defense that every business needs to have in place.

PSA: Concerning Uptick in Email Threats

Img featured psa concerning uptick 1

As events in the world continue to unfold, we once again urge everyone to be very careful and vigilant about unusual activity on their devices as well as your emails.

Data Breach Investigations Report Findings

Img featured data breach investigation 1

The Data Breach Investigations Report findings for 2021 is the topic for today’s tech tip. The Data Breach Investigations Report (DBIR) is a report that analyzes all of the data breaches for the prior year.

What Is Endpoint Detection and Why Should You Demand It from Your IT Firm

Img featured endpoint detection 2

Thanks in part to the pandemic, the number of remote workers has significantly increased. This rapid growth caused many organizations to forgo proper security measures in lieu of productivity, even going as far as letting employees use their personal devices for work.  Instead of exploiting network vulnerabilities, hackers saw more success in targeting unsuspecting and […]

What is Shadow IT?

Img featured shadow it 1

For today’s, Tuesday Tech Tip I want to talk to you about shadow IT. What it is and why every business owner must have this on their radar?

Digital Migration

Img featured digital migration 1

For our Tuesday Tech Tip, I want to talk to you about what they’re calling the Digital Migration. We talked about what that looks like and really what that means as we look forward into the future and stay tuned.

Will Log4J Break the Internet? Experts Say Maybe.

Will Log4J Break the Internet?

One of the digital world’s most dangerous security breaches is currently unfolding, sending everyone from governmental agencies to cybersecurity experts scrambling to patch the hole. It comes at the hands of a critical software vulnerability discovered in Log4J, a Java-based software library used in nearly a third of all web servers in the world. Also […]

What Are File Permissions?

https://youtu.be/9d75lm62BXM Today I want to talk to you about file permissions and the need to review those on a periodic basis. These are ultimately just files that you create on your computer. Many times, the files are on what we call a network share. The files are under the Q drive or the Z drive. […]

What Is A Baseline Security Assessment?

I want to talk to you this morning about a baseline network analysis, or possibly what could be called a security risk assessment. And why you need one. Philip Long here, CEO of Business Information Solutions in Cyber Fortress. First off, let’s talk about what is a baseline security risk assessment? Well, ultimately, it is […]