Tech Talk Blog

Focus Security | Part 1

Educating yourself never stops, nor does CyberSecurity for your organization. We hope you take the few minutes to review our security talking points. As your trusted IT partner, we wanted to take a moment to speak to the ever-growing discussion regarding passwords. What would be the typical outcome? As technology becomes an integral part of […]

Read more

Focus Security | Part 2

Educating yourself never stops, nor does CyberSecurity for your organization. We hope you take the few minutes to review our security talking points. In Part 1 of this article, we highlighted some of the challenges of passwords and their management. In Part 2, we would like to focus on what can be done to help […]

Read more

Focus Security

It’s not likely that your network will be penetrated from outside your walls. That’s not the way hackers hack. They phish. They send emails with tantalizing bits of bait that people nibble on. And when they bite — poof!, a virus or a piece of malware is installed on your network which creates a back […]

Read more

Password Tips for 2018

Passwords – Is mine strong enough?  How do I know?  Every time I write a password article I feel as if this subject has already been done to death by me and others.  But I always get more positive feedback on this subject than others I consider more interesting, so we offer the following suggestions: […]

Read more

Phishing and Spearphishing – Don’t Take The Bait!

Here’s a provocative statement: If you could just prevent your staff from clicking on links or opening attachments in phishing emails, 95% of your cybersecurity problems would be prevented. As perimeter defenses and anti-malware software products have become more effective, cyber-attackers have turned to the phishing email approach as their number one favorite method for […]

Read more

Prepare and Prevent Ransomware Attacks

Ransomware attacks, such as CryptoLocker, CyrptoWall, Locky, Chimera, Zepto, and the like, have become one of the best money-making exploits for cyber-criminals, with new variants appearing on the scene every month.  These attacks usually start with a phishing email and a ZIP file attachment or a malicious link, so email vigilance can help.  But there […]

Read more