Guarding your company’s data

Guarding your company’s data

Some of the most well-known companies in the world have been victims of cyberattacks, including Sony Pictures, Home Depot, Adobe, and eBay. While major corporations are high-profile targets for hackers, small- and medium-sized businesses are not exempt, so they need to secure their networks and data. It may be difficult or impossible to undo any […]

Two excellent ways to verify user identity

Two excellent ways to verify user identity

To keep your network safe from cybercriminals, your first line of defense should be a secure login process. When it comes to verifying user identity, you can choose between two-step authentication and two-factor authentication. Know more about the difference between the two, so you can have a better appreciation of your cybersecurity options. If you […]

Want a more secure password? Learn to think like a Cybercriminal!

Want a more secure password?  Learn to think like a Cybercriminal!

We figure since you’re out to confound the cybercriminals who would misuse your password, it may help to learn how they work!

Past password practices have been discredited. Historically, we’ve all heard or used common techniques such as:

Substituting special characters for letters
Adding digits to common words or names
Repeating characters
Using keyboard patterns (like the characters on the top row of your keyboard).
Forcing periodic password changes
Generating random character sequences for the password, which generally leads to the user writing the password down, usually in an insecure manner like a sticky on the monitor.

How to change your Windows password

How to change your Windows password

Now that we’ve scared you into being worried about the strength of your passwords, perhaps you need instructions on how to change the password you use to log into your computer. Here they are!

How you change your password will depend whether you are sitting in front of the computer that uses the password you want to change, or if you want to change the password on a computer to which you are remotely connected.

Guidelines for Choosing a Strong Password

Guidelines for Choosing a Strong Password

How do you create and remember great passwords? Read on for practical guidelines you can begin using right away.

We all know we have too many passwords and remembering them all has become daunting. It’s commonplace to read about various data breaches in which our user names, email addresses, and passwords are being stolen.

Warning signs your computer has malware

Warning signs your computer has malware

The last thing you want is to let malware persist on your computer, so it pays to know the signs you may be infected. The problem is, for any given symptom, there are often multiple other causes. What’s the best thing to do if you think you may be infected? Why, call your trusty IT […]

Should you monitor your employees online?

Should you monitor your employees online?

To monitor your employees, or not to monitor them, that is the topic of this blog post. If you’ve ever considered checking in on your staff’s online activities, you may have hesitated about whether or not it’s the right decision. We’ve listed the pros and cons of monitoring your employees, and some tips to make […]

Cybersecurity and managed IT services

Cybersecurity and managed IT services

The saying that every company is a technology company is undeniably true, with today’s enterprises unable to function without digital hearts, veins, and arteries. This system, however, comes with a price: a daily onslaught of hacking and other cyberthreats. As such, expertise and robust solutions in cybersecurity are no longer the privilege and luxury of […]