IT Security

IT Risk Assessments – Why do them?

IT risk assessments are an integral part of the Business Continuity process. Even more than with Business Continuity, risk assessments can help determine vulnerabilities for several different industries. The below industries are among the ones to whom risk assessments are most important: -Healthcare The healthcare industry is riddled with compliance and safety regulations, especially when…

Read More

Business Continuity – What is Disaster Recovery?

Disaster Recovery can mean many things to different people. In the technology realm, it is the plan you need to have in place to be prepared for disaster, either human-induced or natural disaster. Disaster recovery is often overlooked for small- to mid-sized business, but the importance is paramount nonetheless. 3 things (at minimum) your Disaster…

Read More

Bluetooth and IoT – What You Need to Know About Hacking

Bluetooth

Just a few days ago, the United States Computer Emergency Readiness Team (US-CERT) issued a statement concerning the risks that Bluetooth devices could be compromised. The Bluetooth implementation vulnerabilities are known as  BlueBorne. In laymen’s terms, it means that millions of Bluetooth-enabled devices are vulnerable to multiple types of compromises.   The vulnerable systems on those devices include Windows, iOS (Apple), Google, Android and Tizen systems. The warning is that a…

Read More

Artificial Intelligence Equals Stronger Defense

What makes us smarter? Is it knowledge? Preparedness? How about a stronger sense of what’s ahead? With IT security, we’re always trying to outsmart the next generation of potential threats. Be it robotic or man-made, it’s the ability to stay ahead of threats that makes us smarter. What’s ahead for the next generation of security?…

Read More

Two-Factor Authentication

virus

Many people don’t know about Two-Factor Authentication (or two-step authentication), but are using it daily. Two-factor authentication means that you have two sets of identification that verify a user’s identity. Basically, the information requested is for two things that only the user should know, and this information authenticates that the user IS the person they…

Read More

Password Management 101

I know you’re excited when you hear the words “Create a New Password”, right? In IT, we hear a LOT about the struggle to track different sites and applications that need a username and password. So what are the best practices to ensure that when created, the username and password are both effective and memorable?…

Read More

I Have Computer Security Software, So Why Should I Worry About Public Wi-Fi?

There’s a common misunderstanding about how Wi-Fi relates to your computer’s security. Wi-Fi is basically the access road to the internet. Once data is released into Wi-Fi, the security of your computer can no longer protect that data. There are secured Wi-Fi channels, which means that you must enter a password to connect, and then…

Read More

Should I Delete This?

If you receive a questionable email, what do you do with it? What if it’s from a good friend, or someone you haven’t spoken with in a while? What if it’s from someone who may legitimately want to do business with you? Common sense – or gut feelings – are probably the biggest ally you…

Read More

Attachment Safety

Attachments can be a great resource to share important information through email, file delivery services, and more. You may be aware that attachments received from people you don’t know can be potentially hazardous to your computers, email, and your stored data. With new technology comes new risk. Thanks to craftier criminals and sophisticated hackers, it’s…

Read More