Posts

email_security_increase_400

Email Security Basics

Email is a modern classic as far as business solutions are concerned,…
ransom_malware_atlanta_400

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the…
Smart_phone_defense_400

How Your Smartphone Keeps Your Data Safe

Smartphones are the predominant mode of communication, as well…
login_qr_code_400

A QR Code Could Be your New Wi-Fi Password

There is no understating the importance of strong, reliable passwords…
Print_This_Security_Checklist_printout_400

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers,…
mobile_devices_400

BYOD is Only Helpful If the Devices Are Secure

Mobile devices are so common nowadays that you’ll likely…
thumb_print_theft_400

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace…
Open the letter with a virus on a blue background.

Tip of the Week: How to Protect Yourself from Invoice Impersonation

As cybercriminals become increasingly sophisticated in their…
ransomware alert

Targeted Ransomware Checks for Particular Attributes

Put yourself in the shoes of a cybercriminal. If you were to…
computer_thumb_awesome_400

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective…