Resources
Cyber Security Tip: DON’T use public WiFi until you read this
We’re all guilty of it: connecting to free public WiFi. Whether it’s at the coffee shop, hotel or airport, the temptation to check e-mail and surf the web is just too strong to resist. So, BEFORE you connect to any free, public WiFi, make sure the connection is legitimate.
Cyber Security Tip: The DANGERS of Dropbox and other file sync apps
If you’re using a personal Box, Dropbox, OneDrive, Google Drive or other consumer-grade file sync and sharing cloud applications, listen up! These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information is being shared with whom.
Cyber Security Tip: What to do if you lose your laptop (or other device)
So, you’re in the car on the way home from Starbucks, basking in the glow of consuming your triple-shot, low-foam, extra-hot pumpkin-spice latte, when you suddenly realize your laptop has gone missing. You drive back like the caffeinated lunatic you are, only to discover no one has turned it in. What do you do? That depends on what precautions you have (or haven’t!) taken.
Cyber Security Tip: REMOVE these from your laptop, tablet or smartphone
Like it or not, device manufacturers LOVE to fill your brand-new PC, tablet or phone full of “free” applications like games, music and photo apps and more (manufacturers actually get paid to install these with the devices they sell).
Cyber Security Tip: This is an easy mistake that can cost you big
Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling of a legitimate one.
Cyber Security Tip: If you installed it, you must update it!
There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe, Microsoft Office, Chrome, QuickBooks, etc.) to gain access to MILLIONS of their users.
Cyber Security Tip: What is the “dark web” anyway?
The “dark web” or “deep web” is a part of the World Wide Web we know and love that is accessible ONLY via a special software that allows users and website operators to remain completely anonymous and untraceable. That’s why it’s the playground for hackers, cybercriminals, drug deals, human trafficking and more.
Cyber Security Tip: How to spot a phishing e-mail
A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus.
Cyber Security Tip: What is this new “zero trust” thing?
Zero trust is a relatively new cyber security strategy that is rapidly becoming the security model of choice for businesses. In fact, we anticipate this to be the new standard to meet data protection compliance for all organizations, large and small.