Phishing Threats and How to Protect Against Them

Phishing Threats and How to Protect Against Them

Have you ever received an email from a name you recognize, asking for a “favor”? If so, you have experienced a phishing scam. The name comes from fishing – cyber criminals are using legitimate names that you recognize to “lure” you in.   Phishing tactics target users...
Importance of MFA

Importance of MFA

When most people think of multi-factor authentication, or two-factor authentication (MFA or 2FA), they think of annoying texts and challenges getting logged into accounts. So why does your IT company keep recommending that you enable it?   If you are like most...

Cyber Attacks – Where and Why – Small Business

Small businesses have been in the cross-hairs of cyber attacks for years, but the methods continue to evolve. Email phishing was (and remains) the common method for hackers to infiltrate computers, compromise user accounts and gain access to money, sensitive...

Windows 11 – To Click or Not to Click … that is the Question

Windows 11 is showing up as a Windows Update (i.e. in-place upgrade from Windows 10 to Windows 11) for some folks. A handful of people have inadvertently upgraded, not noticing exactly its intent – which is not recommended. While there is technically a path back,...

Storing Corporate Data on Personal Cloud Accounts

A question I’m asked frequently is whether it’s OK for employees to utilize personal DropBox or OneDrive accounts for business interactions. It really depends on your business model. Here’s what I mean: 1 – Personal means, well – personal...