Work Home Laptop Cybersecurity

The Cybersecurity Risks of Working from Home

When it comes to cybersecurity, there is not much room for error. Those who fail to adequately secure their IT environment, including remote access employees, may regret their neglect. As more people are working from home rather than at the office, cyber criminals are taking advantage of any weaknesses that may become apparent in the home worker’s IT defenses. Barracuda Networks

Read More
Bank robbery, male robber in black uniform trying to break vault lock. Criminal profession, theft concept

Password Vault – Internet Security Strategy

Everyone knows the importance of passwords. From ancient days, secret passwords have been used to authorize entry for those who know them. Those who could not accurately state the password were restricted access and may even have been considered enemies. That’s the idea behind the use of passwords in the field of computing. The problem is that many passwords are too

Read More

Why You Need Network Documentation

You may be bored enough to read the cereal box some morning when you’re eating breakfast, but it’s not particularly exciting literature. Neither is network documentation. But like the cereal ingredients’ description on the box, good documentation will tell you exactly what’s in your network. And there are plenty of reasons you want your documentation to be good — whether it’s

Read More
Data Security

Passwords aren’t enough-setup MFA and SSO now!!

You are unique in this world, with an identity that no other person has. But sometimes you are called upon to verify your identity in order to access certain services. An identification card may be required for you to cash a check, pick up a prescription, or enter a secure building. In the IT world, identity and access management (IAM) is a discipline

Read More

What is your backup policy? Do you even have one?

If you are practicing proper computer security measures, then you are running routine backups. Do you have a policy for your backups? Is it written down? If so, then add it to your official policy manual so anyone can easily understand and implement it if you have a technology personnel change (this could be an internal person, or an outside firm).

Read More

IT Terms: User Risks

Get IT We know that all the IT (Information Technology) lingo can be confusing. Occasionally we like to post the definitions to terms that we use often. This post is specific to risks that employees encounter often that can completely derail operations. Although these all sound very scary (and they are), through education and user security training, your employees can avoid

Read More
User Security Training

User Security Training – Book it Today

Arming Your Employees With Basic User Security Training Is Job One From desktop to mobile to cloud–technology changes quickly and so do the threats and security measures designed to mitigate them. The best way to arm your staff is thru comprehensive online user security training. How do you teach what you don’t know? The truth is, you can’t. Luckily, there are

Read More