How to Secure Your Data When Using Subcontractors
For today’s tech tip, I want to talk about ways that you can share data and keep it under control whenever you’re using an outsourced third party.
The 6 Layers of Email Defense
For today’s Tuesday Tech Tip, I want to talk about the six layers of email defense that every business needs to have in place.
PSA: Concerning Uptick in Email Threats
As events in the world continue to unfold, we once again urge everyone to be very careful and vigilant about unusual activity on their devices as well as your emails.
Data Breach Investigations Report Findings
The Data Breach Investigations Report findings for 2021 is the topic for today’s tech tip. The Data Breach Investigations Report (DBIR) is a report that analyzes all of the data breaches for the prior year.
What Is Endpoint Detection and Why Should You Demand It from Your IT Firm
Thanks in part to the pandemic, the number of remote workers has significantly increased. This rapid growth caused many organizations to forgo proper security measures in lieu of productivity, even going as far as letting employees use their personal devices for work. Instead of exploiting network vulnerabilities, hackers saw more success in targeting unsuspecting and […]
What is Shadow IT?
For today’s, Tuesday Tech Tip I want to talk to you about shadow IT. What it is and why every business owner must have this on their radar?
5 Cybersecurity Trends to Watch in 2022
For this week’s Tuesday Tech Tip. We’re going to talk about the 5 biggest cybersecurity trends that are expected in 2022 as it relates to cybercriminals.
Digital Migration
For our Tuesday Tech Tip, I want to talk to you about what they’re calling the Digital Migration. We talked about what that looks like and really what that means as we look forward into the future and stay tuned.
Will Log4J Break the Internet? Experts Say Maybe.
One of the digital world’s most dangerous security breaches is currently unfolding, sending everyone from governmental agencies to cybersecurity experts scrambling to patch the hole. It comes at the hands of a critical software vulnerability discovered in Log4J, a Java-based software library used in nearly a third of all web servers in the world. Also […]
What Are File Permissions?
https://youtu.be/9d75lm62BXM Today I want to talk to you about file permissions and the need to review those on a periodic basis. These are ultimately just files that you create on your computer. Many times, the files are on what we call a network share. The files are under the Q drive or the Z drive. […]