Tech Tip: Use Strong Passwords

January 14, 2019

Hacking software can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds.

Tech Tip: Working from Home? Don’t! Until You Read This …

January 7, 2019

Unless your personal device is covered under a managed services plan, you could accidentally introduce a virus into your company’s network.

Tech Tip: Is Complying With PCI Requirements Good Enough?

December 24, 2018

While the PCI architecture and requirements overlap with network security issues, a network security audit will take a deeper look into how you utilize the technology you own.

Tech Tip: Is It Time for Cybersecurity Planning

December 17, 2018

There are great resources out there for businesses that just don’t know where to start with cybersecurity, and the time to make plans is now.

Tech Tip: Should My Computer Be Encrypted?

December 10, 2018

With the drive encrypted, a thief can’t just pull it out, hook it up and suddenly have access to all your files. At least you’ve made it pretty hard to get to your data.

Tech Tip: New Quarter, New Password

December 3, 2018

Maintaining separate passwords, and changing them at least every three months, is a lot of work, but the cybersociety we live in demands it.

Tech Tip: Do You Allow Guests to Access Your WiFi Network?

November 26, 2018

If you give out your password, you’re practically opening the door for anyone to come in and steal private information and infect your private computers.

Tech Tip: Do You Enter Your PIN When Using Your Debit Card?

November 19, 2018

Run the card as credit and you’ll almost always get more antifraud protection should you have a problem with a purchase or if the card number is stolen.

Tech Tip: Cloud Apps Are a Huge Threat

November 12, 2018

Company data can be spread far and wide without central oversight of what information is being shared with whom.

Tech Tip: Is This Request Really From the Boss?

November 5, 2018

If you get a request relating to personnel, confidential information or banking transactions from someone in your organization, you must double-check that it really came from that person.