Tech Tip: How to Foil ‘Ransomware’

January 28, 2019

The last CryptoLocker virus forced many business owners to lose data or pay up, since there was no other way to decrypt the files.

Tech Tip: If This Type of Alert Pops Up, Don’t Click!

January 21, 2019

This is a common scareware tactic used by hackers to get you to click and download a virus. Legitimate companies would never deliver that type of pop-up to you.

Tech Tip: Use Strong Passwords

January 14, 2019

Hacking software can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds.

Tech Tip: Is Complying With PCI Requirements Good Enough?

December 24, 2018

While the PCI architecture and requirements overlap with network security issues, a network security audit will take a deeper look into how you utilize the technology you own.

Tech Tip: Is It Time for Cybersecurity Planning

December 17, 2018

There are great resources out there for businesses that just don’t know where to start with cybersecurity, and the time to make plans is now.

Tech Tip: Should My Computer Be Encrypted?

December 10, 2018

With the drive encrypted, a thief can’t just pull it out, hook it up and suddenly have access to all your files. At least you’ve made it pretty hard to get to your data.

Tech Tip: New Quarter, New Password

December 3, 2018

Maintaining separate passwords, and changing them at least every three months, is a lot of work, but the cybersociety we live in demands it.

Tech Tip: Do You Allow Guests to Access Your WiFi Network?

November 26, 2018

If you give out your password, you’re practically opening the door for anyone to come in and steal private information and infect your private computers.

Tech Tip: Do You Enter Your PIN When Using Your Debit Card?

November 19, 2018

Run the card as credit and you’ll almost always get more antifraud protection should you have a problem with a purchase or if the card number is stolen.

Tech Tip: Is This Request Really From the Boss?

November 5, 2018

If you get a request relating to personnel, confidential information or banking transactions from someone in your organization, you must double-check that it really came from that person.