Posts
5 ways to protect your mobile device from malware
GSMA real-time intelligence data estimates there are now over 5.15 Billion people worldwide with mobile devices. With over 66% of the world’s population having a mobile device (cell phone, tablet or cellular enabled IoT devices) security is…
3 Reasons to Use Cloud Backup
Wondering why you should use cloud backup? Top reasons include technology failure, cost savings, and security. We break it down in this informative infographic! (View infographic as a PDF)
6 Ways to Protect Yourself from SIM Swapping
Scammers and hackers are constantly coming up with new ways to steal your personal information. These days the mobile phone in your pocket or purse is directly tied to your online identity. Scammers have devised a relatively new way to target…
Top 4 ways to share large files online
It has happened to all of us – a PowerPoint file, graphics file or really any large file that urgently needs to get to people both inside and outside your company. Historically, you were pretty much limited to email, however many organizations…
Top 7 Weaknesses that Malware Exploits
Malware threats are on the rise! So how are these viruses, worms, and trojans continuing to infiltrate businesses around the world? We break it down in this informative infographic! (View infographic as a PDF)
15 Tips for Creating a Hack-Proof Password
These days virtually every device, app or website requires a password. It is estimated that by 2020, the number of passwords used by humans and machines worldwide will grow to 300 billion. With that many passwords flying around, it’s important…
Top 3 Criteria for Choosing Cloud vs On-Site Backup
Backing up your data is like insurance. You need to do it so you’re prepared when disaster strikes. From natural disasters to hardware failures to malware, the threats are significant. Seagate reports that 140,000 hard drives fail in the United…
9 Key Elements of a Disaster Recovery Plan
The question isn’t if your business will experience a disaster, it’s when. From hardware failures to natural disasters to cybercrime, the threats to your business are growing in number and severity. Seagate reports that 140,000 hard drives…
5 Types of Phishing & How to Prevent Being Caught
Phishing gets lots of media attention; however, for many it is a bit of a mystery. What is phishing? Are there different types of phishing? How can you prevent a phishing attack? Let’s investigate each of these areas in detail.
What is phishing?
Wikipedia…
4 stages of a ransomware attack
You hear news reports almost daily about ransomware taking down organizations around the globe. Cyber Security Ventures estimates a new organization will fall victim to ransomware every 14 seconds in 2019, and every 11 seconds by 2021.
What…
Top 2 Ways to Protect Your Data
Does having antivirus software on your computer protect you and your data from cyberthreats? What else should you be doing? Backups, software updates, firewalls, there are lots of options to consider. Let’s start with a few basic definitions: Virus…
8 Malware & Ransomware Threats You Need to Know
To understand malware and ransomware we need to first define what each is. Let’s start with the basic definitions: Malware is a broad term describing any malicious code or program, including viruses, worms, and trojans, that provide an…