Tech Tip: Start With the Basics

July 8, 2019

In this day and age, there is more to the security “basics” than a solid firewall. A single crack in your armor can open the door for network attacks.

Tech Tip: Don’t Download Anything Without Checking First

July 1, 2019

Free apps come with a price: security. These applications are known for security vulnerabilities and hacks.

Tech Tip: Do Online Banking? Read This …

June 24, 2019

Never access your online account with a PC or a device that you use to log in to social media sites or free email accounts (like Hotmail) or to surf the web.

Tech Tip: Keep Staff From Unintentionally Causing a Data Breach

June 17, 2019

With so many access points — from cell phones to laptops to home computers — how can anyone hope to keep their network safe from hackers, viruses and other unintentional security breaches?

Tech Tip: If You’ve Ever Said This, You’re Asking to Be Hacked

June 3, 2019

One in five small businesses falls victim to cybercrime. Plus, half of all cyberattacks are aimed at small businesses because they are small.

Tech Tip: The Number-One Threat to Your Security Is …

May 28, 2019

Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online.

Tech Tip: Network Security Can Secure Your Reputation, Too

May 20, 2019

What would happen to your business if an employee accidentally exposed your network to entry from unauthorized entities?

Tech Tip: Don’t Just Close Your Browser

April 22, 2019

If you simply close your browser, some of the session information is still running in the background —  and a hacker may be able to use that to gain entry.

Tech Tip: Make This Password Different From All the Others

April 14, 2019

If an e-commerce site you’ve registered at or bought from gets hacked, and you’ve used the same password you use for everything else, hackers are going to gain access to your in-box.

Tech Tip: Work Computers and Devices Are Only for One Thing

April 1, 2019

If you’re using a company device to access a compromised account, you’re opening up a door to a hacker, who can then get into your company’s network.