Artificial Intelligence Equals Stronger Defense

What makes us smarter? Is it knowledge? Preparedness? How about a stronger sense of what’s ahead? With IT security, we’re always trying to outsmart the next generation of potential threats. Be it robotic or man-made, it’s the ability to stay ahead of threats that makes us smarter. What’s ahead for the next generation of security? It’s the incorporation of machine learning, otherwise known as Artificial...

July 19, 2017 by James Edwards 0 Comments
Read More

Two-Factor Authentication

Many people don’t know about Two-Factor Authentication (or two-step authentication), but are using it daily. Two-factor authentication means that you have two sets of identification that verify a user’s identity. Basically, the information requested is for two things that only the user should know, and this information authenticates that the user IS the person they claim to be. For example, several leading...

Read More

Password Management 101

I know you’re excited when you hear the words “Create a New Password”, right? In IT, we hear a LOT about the struggle to track different sites and applications that need a username and password. So what are the best practices to ensure that when created, the username and password are both effective and memorable? First, these are the basic points that we recommend when creating your password: Do not reuse or...

May 23, 2017 by James Edwards 0 Comments Tags: IT Security, Password
Read More

I Have Computer Security Software, So Why Should I Worry About Public Wi-Fi?

There’s a common misunderstanding about how Wi-Fi relates to your computer’s security. Wi-Fi is basically the access road to the internet. Once data is released into Wi-Fi, the security of your computer can no longer protect that data. There are secured Wi-Fi channels, which means that you must enter a password to connect, and then there are public Wi-Fi channels which are open to anyone to use. I’m explaining...

May 16, 2017 by James Edwards 0 Comments Tags: IT Security, wifi
Read More

Should I Delete This?

If you receive a questionable email, what do you do with it? What if it’s from a good friend, or someone you haven’t spoken with in a while? What if it’s from someone who may legitimately want to do business with you? Common sense – or gut feelings – are probably the biggest ally you have to decide what to do next. What made you second-guess the email’s authenticity? Is it something you could Google online to...

May 09, 2017 by James Edwards 0 Comments Tags: email, spam, viruses
Read More

Attachment Safety

Attachments can be a great resource to share important information through email, file delivery services, and more. You may be aware that attachments received from people you don’t know can be potentially hazardous to your computers, email, and your stored data. With new technology comes new risk. Thanks to craftier criminals and sophisticated hackers, it’s harder to spot the real ones from the fake ones. So...

April 25, 2017 by James Edwards 0 Comments
Read More

Think Before You Click

I know you’ve probably heard this before: When you’re online, don’t click something unless you know it’s from someone or something that you recognize. But there’s a reason that it’s important to repeat this. Clicking unknown links is STILL one of the most common forms of security breaches. It can lead to everything from compromises to stolen information. And sure, spammers are getting craftier in their ways to...

April 18, 2017 by James Edwards 0 Comments
Read More