Cybersecurity

As more of us are working from home, cybercriminals are using this transition to find security lapses to exploit while we are more vulnerable. What other steps can you take to secure your home network beyond your organization’s cybersecurity policies and practices?  These are a few security measures that you can take to minimize the risk and protect not...

With many workplaces going entirely remote some for the first time, employers have to deal with new challenges caused by the sudden shift. One of the more significant challenges is making sure that employees stay secure while doing their daily work. This requires special attention...

With more than 90% of successful hacks and data breaches starting with phishing scams and 99% of email attacks relying on victims clicking links, it's important to learn how to click intelligently. It used to be the rule of thumb that it was generally safe to click links...

How can IT providers best be equipped for the challenges for clients who transition to remote/cloud working? Fundamentally, technology firms must understand each client’s business needs and implement practical technologies that meet these needs. This hasn’t changed with working remote and cloud computing. While these transitions...

There’s no question about it: The world needs managed security service providers. As the COVID-19 pandemic continues to take hold across the globe, organizations are having to adapt to limit contact and person-to-person contamination rapidly. This dynamic environment has significant consequences on the security of an...

ATTEN: CrtypoAPI Critical Patch today Today marks the End-of-Life for Windows 7 support – meaning that, from now on, no security updates will be issued on Patch Tuesdays for Windows 7 systems.  Microsoft just released a CVE-2020-0601 patch to address a critical vulnerability in all Windows Operating systems. Early...

Best Practices for Password Protection Microsofts Identity Threat Research Team [recently revealed](https://google.com) that 44 million user accounts are using passwords that have been previously stolen and leaked. How does this happen? People re-use the same password across multiple accounts. This eye-popping statistic highlights the fact that...

How to Holiday Shop Online Securely Holidays can be very stressful, especially when it comes to shopping for loved ones. In order to make this process a little easier, many turn to online shopping especially during special events like Cyber Monday. However, even though online shopping...

HAVE A QUESTION ABOUT ONE OF OUR SERVICES?