Posts

5 ways to protect your mobile device from malware

5 ways to protect your mobile device from malware

GSMA real-time intelligence data estimates there are now over 5.15 Billion people worldwide with mobile devices. With over 66% of the world’s population having a mobile device (cell phone, tablet or cellular enabled IoT devices) security is…
3 Reasons to Use Cloud Backup

3 Reasons to Use Cloud Backup

Wondering why you should use cloud backup? Top reasons include technology failure, cost savings, and security. We break it down in this informative infographic!   (View infographic as a PDF)
Top 7 Ways to Prevent Employee Data Theft

Top 7 Ways to Prevent Employee Data Theft

Data is everywhere; it’s like air. And the volume of data companies are accumulating is growing at an exponential rate. It is estimated that by 2020 every human will create 1.7 megabytes of information each second. This works out to more than…
6 Ways to Protect Yourself from SIM Swapping

6 Ways to Protect Yourself from SIM Swapping

Scammers and hackers are constantly coming up with new ways to steal your personal information. These days the mobile phone in your pocket or purse is directly tied to your online identity. Scammers have devised a relatively new way to target…
Top 4 ways to share large files online

Top 4 ways to share large files online

It has happened to all of us – a PowerPoint file, graphics file or really any large file that urgently needs to get to people both inside and outside your company. Historically, you were pretty much limited to email, however many organizations…
Top 7 Weaknesses that Malware Exploits

Top 7 Weaknesses that Malware Exploits

Malware threats are on the rise! So how are these viruses, worms, and trojans continuing to infiltrate businesses around the world? We break it down in this informative infographic! (View infographic as a PDF)
15 Tips for Creating a Hack-Proof Password

15 Tips for Creating a Hack-Proof Password

These days virtually every device, app or website requires a password. It is estimated that by 2020, the number of passwords used by humans and machines worldwide will grow to 300 billion. With that many passwords flying around, it’s important…
Top 3 Criteria for Choosing Cloud vs On-Site Backup

Top 3 Criteria for Choosing Cloud vs On-Site Backup

Backing up your data is like insurance. You need to do it so you’re prepared when disaster strikes. From natural disasters to hardware failures to malware, the threats are significant. Seagate reports that 140,000 hard drives fail in the United…
9 Key Elements of a Disaster Recovery Plan

9 Key Elements of a Disaster Recovery Plan

The question isn’t if your business will experience a disaster, it’s when. From hardware failures to natural disasters to cybercrime, the threats to your business are growing in number and severity. Seagate reports that 140,000 hard drives…
5 Types of Phishing & How to Prevent Being Caught

5 Types of Phishing & How to Prevent Being Caught

Phishing gets lots of media attention; however, for many it is a bit of a mystery. What is phishing? Are there different types of phishing? How can you prevent a phishing attack? Let’s investigate each of these areas in detail. What is phishing? Wikipedia…
4 stages of a ransomware attack

4 stages of a ransomware attack

You hear news reports almost daily about ransomware taking down organizations around the globe. Cyber Security Ventures estimates a new organization will fall victim to ransomware every 14 seconds in 2019, and every 11 seconds by 2021. What…

Top 2 Ways to Protect Your Data

Does having antivirus software on your computer protect you and your data from cyberthreats? What else should you be doing? Backups, software updates, firewalls, there are lots of options to consider. Let’s start with a few basic definitions: Virus…