Tech Tip: Change Your Name — and We Don’t Mean the Last One

May 10, 2021

Too often we see email usernames and prefixes the same across multiple free email services, making the work of hackers way too easy.

Tech Tip: Start With the Cybersecurity Basics

May 3, 2021

In this day and age, there is more to the cybersecurity “basics” than antivirus software and a strong firewall. Have you trained your employees?

Tech Tip: Don’t Download Anything You’re Not Authorized to Download

April 26, 2021

Dropbox and other free apps come with a price: SECURITY. These applications are known for security vulnerabilities and hacks.

Tech Tip: Do Online Banking? Read This …

April 19, 2021

Keeping one PC dedicated to online banking reduces your chances of getting a bank account-hacking virus.

Tech Tip: How to Keep Staff From Unintentionally Causing a Security Breach

April 12, 2021

With so many access points, how can business owners hope to keep their network safe from hackers, viruses and other unintentional security breaches?

Tech Tip: Solid State Storage Can Breathe New Life Into Your Computer

April 5, 2021

The modern PC has an incredible amount of processing power, which means the speed of your hard drive could be a problem if it doesn’t perform fast enough. 

Tech Tip: If You’ve Ever Said This, You’re Asking to Be Hacked

March 29, 2021

Half of all cyberattacks are aimed at small businesses BECAUSE they make themselves low-hanging fruit, with sloppy or nonexistent security protocols.

Tech Tip: The Number-One Threat to Your Security Is …

March 22, 2021

Human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day.

3 Rules for Keeping Your Data Safe in the Cloud

March 15, 2021

If you’re using any kind of cloud application — and these days, who isn’t? — you’re right to be concerned about data privacy and security.

Tech Tip: You’ve Been Hacked! What’s the First Thing You Should Do?

March 8, 2021

The faster the pros can address the attack — and determine the extent of the data, applications and machines compromised — the better your chances of preventing bigger problems.