Tech Tip: Change Your Name — And I Don’t Mean the Last One

June 8, 2020

With the first part of your email addresses easy to figure out, hackers and cybercriminals can get access to other online services and data — or even spoof your email address to others.

Tech Tip: Don’t Download Anything You’re Not Authorized to Download

May 26, 2020

The right thing to do is to ask your IT department or provider to assist you by installing a secure, commercial-grade, file-sharing application.

Tech Tip: Do Online Banking? Read This …

May 18, 2020

Never access your online account with a PC or device that you use to log in to social media sites or free email accounts (like Hotmail) or to surf the web.

Tech Tip: Make Phishing Training a Priority

May 4, 2020

With businesses forced to use technology to support a remote workforce, It becomes extremely important to train your employees to spot phishing attempts.

Tech Tip: If You’ve Ever Said This, You’re Asking to Be Hacked

April 27, 2020

Half of all cyberattacks are aimed at small businesses because they make themselves low-hanging fruit with sloppy or nonexistent security protocols.

Tech Tip: The Number-One Threat to Your Security Is …

April 20, 2020

Employees’ actions can subject the company they work for to monetary loss, civil lawsuits, data theft and, yes, criminal charges.

Tech Tip: 3 Rules for Keeping Your Data Safe in the Cloud

April 13, 2020

Most cloud breaches are due to user error. So it’s important that you, the user, are being smart about security.

Tech Tip: You’ve Been Hacked! What’s the First Thing You Should Do?

April 6, 2020

The faster the pros can address the attack, the better your chances are of preventing much bigger problems.

Tech Tip: Your Firewall Is Useless Unless …

March 23, 2020

A firewall is a device that acts like a security cop watching over your computer network to detect unauthorized access and activity — and EVERY business and individual needs one.

Tech Tip: Don’t Just Close Your Browser

March 16, 2020

If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background.