Cybersecurity

How password authentication works

By Brandon Jackson

Ever wondered why most systems can’t tell you what password you used when you signed up? Or wondered if your password was being stored insecurely by a service you were using? How can you even tell if it’s stored securely, and what does that mean?

Read More

Are phishing attacks on the rise?

By Brandon Jackson

Nobody wants to believe they can become a victim of a phishing attack. After all, you’re smarter than that, right? The truth is that even smart people fall for them, and phishing attacks are on the rise as a result. However, the tactics they use have changed in the last year or so. When phishing…

Read More

Are cloud services secure?

By John Merrey

Cloud services can be a great solution. You can get storage and software without worrying about constant upgrading and replacing local software and even hardware. But with any cloud services, security is always a concern.

Read More

Login without password

By Brandon Jackson

When it comes to cybersecurity, passwords are inherently part of the problem. Whether yours are complex and easy to forget, short and easy for hackers to guess, or you write them down on a piece of paper that you end up losing, they cause a lot of issues.

Read More

More tips to avoid phishing attacks

By John Merrey

Phishing attacks have been on the rise for many years now. Just as technology adapts to the attacks, the attackers continue to adapt to the technology, trying newer and more effective phishing methods on a regular basis.

Read More
Woman questioning security

Are password managers really secure?

By Brandon Jackson

For years now we’ve advised clients to use a password manager. It’s a much better option than scribbling your passwords down on tiny pieces of paper or even storing them in your web browser. Simply put, a password manager makes it easy to remember your secure passwords. You can even share passwords with other people on your team. But are password managers really secure? Only if you pick the right option.

Read More

Should I use a password or fingerprint?

By John Merrey

With all the data today’s computers and phones have on them, they need to be properly secured. After all, you’re walking around with a device that can access your social media, email, and even bank accounts. Do you really want to risk someone stealing your identity because your phone wasn’t properly secured? So which one should you use, a password or your fingerprint?

Read More

Ransomware: Pay or not?

By Brandon Jackson

We’ve talked about how ransomware works previously. It should be a concern for all small and medium-sized business owners. But what if you’ve already been infected? Should you just pay the ransomware demands or not?

Read More

How cybersecurity has changed

By Brandon Jackson

Over the course of my career, technology has changed drastically. As a result, the measures we have to take to keep things secure has changed as well.

Read More

How password managers work

By Brandon Jackson

If you’re like many other people, you may have kept track of your passwords with a pen and paper for years now. Maybe you’ve heard of password managers, but you were wary of them because you weren’t sure how they worked.

Read More