It’s important to protect yourself from phishing scams. But what is a phishing scam? How is phishing accomplished in the first place?
Read MoreEver wondered why most systems can’t tell you what password you used when you signed up? Or wondered if your password was being stored insecurely by a service you were using? How can you even tell if it’s stored securely, and what does that mean?
Read MoreIn years past, businesses purchased software, installed it on computers, and then at some point they had to upgrade it. That’s how everything worked, and Microsoft Office suite was no exception.
Read MoreThe Centers for Disease Control and Prevention (CDC) and World Health Organization (WHO) are recommending organizations have a plan for conducting business should the COVID-19 virus continue to affect the U.S. and world populations. Not every business can afford to close or move to a “work from home” environment, so what should you consider when developing a plan for your company and workers?
Read MoreI’m often asked how cloud computing works. People tell me they have no experience with it and don’t understand it. The truth is, if you’ve had somebody hosting your email for ten years, then you’ve used cloud computing for ten years.
Read MoreIf you work in an all-Mac environment, or even if you work in a Windows environment but one or two people have a Mac, you may have wondered if Office 365 can be used on a Mac. The short answer: Yes, but it depends how you’re using it. The online version of Office 365 If…
Read MoreNobody wants to believe they can become a victim of a phishing attack. After all, you’re smarter than that, right? The truth is that even smart people fall for them, and phishing attacks are on the rise as a result. However, the tactics they use have changed in the last year or so. When phishing…
Read MoreCloud services can be a great solution. You can get storage and software without worrying about constant upgrading and replacing local software and even hardware. But with any cloud services, security is always a concern.
Read MoreIn years past, data storage for many organizations was done through local servers. In the last couple of decades, a couple different options have become widespread: Network Attached Storage—NAS— and the cloud.
Read MoreWhen it comes to cybersecurity, passwords are inherently part of the problem. Whether yours are complex and easy to forget, short and easy for hackers to guess, or you write them down on a piece of paper that you end up losing, they cause a lot of issues.
Read More