-
How You Can Protect Your Practice or Firm with Whitelisting
Antivirus software is about 40 percent effective, according to ZueS Tracker, a tool that tracks malicious hosts. This statistic is startling, especially for organizations that rely almost solely on antivirus…
-
5 Ways our Military Background Helps Us Better Serve our Clients
In 2015, more than 21.2 million men and women were veterans, accounting for about 9 percent of the civilian non-institutional population age 18 and over, according to the Bureau of…
-
Are You Using a Password Manager?
How many passwords do you have? They have become essential for many websites that we login to, change often and can be hard to keep straight. Although passwords can feel…
-
Ransomware: How to Protect Your Data from Being Held for Ransom
Ransomware attacks are real and they are on the rise – affecting organizations of every shape and size. Ransomware, a malicious type of software, indiscriminately encrypts a company’s files, and…
-
Spring Cleaning: Don’t Forget Your Technology!
Every year when spring arrives, people celebrate the end of winter and begin to emerge from their hibernation. It is during this season that summer preparations begin. Winter things are…
-
Four Types of Email Cons Using Social Engineering
Social Engineering is the psychological manipulation of people in an effort to have them perform actions or divulge confidential information, and it is a major security issue. For centuries, con…
-
Network Security Improvement Advice for Any Network
The optimal method to assure your organization does not suffer due to a network attack is to prevent attacks from causing any damage. There are several ways to reduce the…
-
Ransomware Remains a Risk in 2016
2015 was rife with widespread propagation of ransomware and 2016 will be much the same. What is it? Ransomware is different than most historical malware. Instead of hacking into a…
-
How Can I Block CryptoLocker?
First off, a little back story. If you don’t know what CryptoLocker is, it is a very effective piece of malware. Specifically, it is a type of malware that holds…
-
Avoiding Malicious Websites
For those of us that have seen The Wizard of Oz, the Internet is like the field of poppies. Good and bad websites cannot be identified simply by looking at…
-
The Value of Support – What to look for when evaluating your service provider
Not all hosting companies have a good client support system. As a healthcare or financial provider you need to make sure that you not only look at their security, uptime and service…
-
6 Benefits of Moving to the Cloud (Part 2)
In Part I of The Benefits of Moving to the Cloud, we discussed how cost effective, scalable, and secure it is to implement a cloud solution for your IT needs.…