3 Rules for Keeping Your Data Safe in the Cloud

March 15, 2021

If you’re using any kind of cloud application — and these days, who isn’t? — you’re right to be concerned about data privacy and security.

Tech Tip: You’ve Been Hacked! What’s the First Thing You Should Do?

March 8, 2021

The faster the pros can address the attack — and determine the extent of the data, applications and machines compromised — the better your chances of preventing bigger problems.

Tech Tip: A Warning If You Handle, Process or Store Client Credit Cards

March 1, 2021

Are you subject to Payment Card Industry Data Security Standards if you take credit card payments over the phone? Absolutely!

Tech Tip: Your Firewall Is Useless, Unless …

February 22, 2021

A firewall is a device that acts like a security cop, watching over your computer network to detect unauthorized access and activity.

Tech Tip: Don’t Just Close Your Browser

February 15, 2021

If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background.

Tech Tip: Make This Password Unlike All the Rest

February 8, 2021

You know you’re guilty of it: using the same password for everything. And yes, it’s annoying to try and remember all those passwords. But read on.

Tech Tip: Set Up Bank Alerts Now!

February 1, 2021

Many banks will send you an email alert whenever money is withdrawn from your account via check, debit card or transfer.

Tech Tip: Work Computers and Devices Are Only for One Thing …

January 25, 2021

If you’re using a company device to access a compromised account, you’re opening up a door to a hacker — who can then get into your company’s network via your email or PC.

Tech Tip: Don’t Use Public WiFi Until You Read This …

January 18, 2021

Whether it’s at the coffee shop, hotel or airport, the temptation to check email and surf the web is just too strong to resist.

Tech Tip: The Dangers of Dropbox and Other File Sync Apps

January 11, 2021

Over seven million Dropbox accounts have been hacked, giving cybercriminals a path into the networks of the companies these users work for and with.