It’s not a secret. We now live in a world where cyber criminals work day in and day out to hack into small and medium sized businesses in an effort to make money. This practice has become a profession that’s quickly bringing businesses down.
Despite companies working hard to protect against these threats, hackers have developed ways to mimic user behavior as a means of gaining access to sensitive information.
Have you noticed the “not secure” message in the address bar when you head to certain websites on Google Chrome? As safe as the site might be, if they don’t have a secure layer (Secure Sockets Layer - SSL or HTTPS certificate), you’ll receive a warning when trying to visit their URL. That’s a new feature in Google Chrome as of July 2018 and it’s one that’s worth paying attention to.
Here are 6 ways you can use to separate important emails from phishing attempts, click here to learn more!
I often share articles about how to protect your business network from cyber crime. But, one very real threat that I haven’t talked about is how cyber criminals are hacking into home networks through children.
If you’re a parent, here are some vulnerabilities you should know about when your kids use devices to access the internet.
Wondering if Microsoft Office 365 is right for your small or medium sized business?
If not, you should be. The fact of the matter is, all businesses should be utilizing Office 365 (or at least a portion of it).
But... in today’s blog, we’re not going to be talking about the basics of why you need Office 365. If you want to learn more about that, check out our past blog post here.
There’s been a lot of talk these days about Office 365 and the many benefits it provides for small and medium-sized businesses. After all, the company’s famous Office Suite has been around since 1988 and its applications – Word, Excel and PowerPoint, set the industry standards for word processing, spreadsheet utilization, and presentation software.
Ransomware continues to be one of the largest threats in terms of IT security for businesses. Cyber Criminals are becoming more and more innovative with both the strategies they use, as well the as the technology being created and implemented.
In the video below, Kevin Mitnick from Knowbe4 Security Awareness Training demonstrates how malicious Ransomware can pose to be something trustworthy, such as a Microsoft update, to gain access to your system.
When your productivity is measured in tasks crossed off your checklist and projects finalized, it’s easy to develop a one-track mind. You know you need to get your work done, so other details, such as IT security, fall to the wayside. After all, isn’t that why you have an IT department, or outside managed IT services? Yes and no.
Have you ever heard about cyber attacks in the news and think “that would never happen to us?” Well, think again. Businesses of all sizes are susceptible to many different attacks. Here are 7 you need to know about.