Macs Are Not Immune to Cybersecurity Threats

Macs Are Not Immune to Cybersecurity Threats

It’s a common myth that Apple computers don’t get viruses. It’s not uncommon for a Mac user to chime in and say, “you should have gotten a Mac,” when a PC user mentions getting a virus or malware.  Let’s unpack this myth, and talk a little about how, no matter what technology you have, you need to protect it.

Not All Cybersecurity Efforts Work to Keep You Secure

Not All Cybersecurity Efforts Work to Keep You Secure

There are many security buzzwords that come into play when the technology available to help secure a business is discussed. The problem is that many of these buzzwords sound great but are actually very poor fits to the real needs of most small and medium-sized businesses. Let’s consider how these buzzwords play into the concept of “security theater” and how … Read More

How Secure is Your Data, Really?

Internet-based companies have access to an audience that, at the very least, are extremely trusting of them. There is an expectation that these businesses will fulfill their promises while also protecting the information that their customers and clients provide to them, but are these expectations well-founded? Let’s consider common collection practices companies deploy and how you can keep yourself safe.

Make IT Security a Priority for Your Business

With so many people working from home due to stay-at-home orders resulting from the COVID-19 pandemic, IT security may not be at the forefront of users’ minds. Unfortunately, scammers and hackers aren’t unemployed during this time and are still causing havoc for businesses of all sizes. Let’s take a look at cybersecurity during COVID-19.

Video Conferencing Security is Important

Video conferencing has been one of the surprise winners of the COVID-19 era. As large percentages of people are asked to distance from others, one solution that has been extremely popular is to have meetings over the Internet. While seemingly the whole world is using video conferencing solutions, for the business, there are other considerations that have to be made. … Read More

Tip of the Week: Sanitize Your Computer

While we may talk about computer viruses a lot, we wanted to change tack briefly and talk about the other kind–the kind that makes you sick, rather than your technology. With COVID-19 still plaguing the news, we felt that there was no time like the present to do so.

Scammers are Using Economic Impact Payments to Phish People

It may not be a surprise to you that hackers and other scammers are trying to get between you and your stimulus money. Using the COVID-19 pandemic to prey on unsuspecting or ill-prepared people, they have already made off with more than millions of the $290 billion that the U.S. government has earmarked for its citizens. Let’s look at how … Read More

Is Security in Telework a Myth?

With so many people working from home due to the COVID-19 outbreak, organizational IT security is stretched thin. It is important that you know how to maintain operational integrity while prioritizing security when your whole staff is working from home. 

How to Ensure Your Cloud Platforms are Secure

Before we start on what practices you should be prioritizing when it comes to your cloud resources, we want to recognize that most businesses have found cloud computing to be extraordinarily useful. In fact, that is why we wanted to discuss some actions that you need to implement to help keep your cloud-based resources secure. 

What You Need to Do with IT and OT Interconnecting

The past two decades have generally seen business technology in one of two camps: either IT (information technology), which includes all of a business’ computers, peripherals, and networking equipment, or OT (operational technology), which included everything else. As time has passed, both have advanced, and now both carry the risks once limited to IT. Let’s examine how you can better … Read More