Cybersecurity

Should I use a password or fingerprint?

By John Merrey

With all the data today’s computers and phones have on them, they need to be properly secured. After all, you’re walking around with a device that can access your social media, email, and even bank accounts. Do you really want to risk someone stealing your identity because your phone wasn’t properly secured? So which one should you use, a password or your fingerprint?

Read More

Ransomware: Pay or not?

By Brandon Jackson

We’ve talked about how ransomware works previously. It should be a concern for all small and medium-sized business owners. But what if you’ve already been infected? Should you just pay the ransomware demands or not?

Read More

How cybersecurity has changed

By Brandon Jackson

Over the course of my career, technology has changed drastically. As a result, the measures we have to take to keep things secure has changed as well.

Read More

How password managers work

By Brandon Jackson

If you’re like many other people, you may have kept track of your passwords with a pen and paper for years now. Maybe you’ve heard of password managers, but you were wary of them because you weren’t sure how they worked.

Read More

Which Office 365 do I need?

By Brandon Jackson

Office 365 is a cloud-based subscription from Microsoft. It combines multiple applications and services, making them an attractive option for small and medium businesses.

Read More

How phishing affects businesses

By John Merrey

We’ve talked previously about how to protect yourself from phishing scams. But is phishing something you should even be concerned about? How does phishing actually affect businesses? Does it actually affect businesses at all?

Read More

Why password length is important

By John Merrey

Did you know that the most popular password in 2018 was “123456”? Or that the second most popular was “password”? Third place was “123456789” and fourth place was “12345678.” Talk about making things easier for hackers! Let’s take a look at what the best length is for passwords, then whether you really need to worry about having a complex password or not.

Read More

How do I report a phishing email?

By Brandon Jackson

If you’ve ever had someone access any of your online accounts without your consent, you know what a pain it can be. Depending on what is accessed, it can range from being annoying to being a huge problem. So when you get a phishing email that’s trying to steal your login information, how do you report it so that others aren’t taken advantage of?

Read More

Office 365 or Exchange?

By John Merrey

Many of our clients have a background in a traditional corporate environment. As a result, they often have experience with a Microsoft Exchange Server for their email and calendar. But now that Office 365 is an option, it’s not always clear which of the two is the better choice. How can you decide which one is right for you and your organization?

Read More

How ransomware works

By Brandon Jackson

You’ve probably heard about ransomware for some time now. But if you’re like most small and medium business owners you may not really know what it is. You may also be assuming you shouldn’t be worried about it. In reality, you’re probably a better target than most large businesses!

Read More