What’s the biggest threat to your company’s computer & network security? It might surprise you to learn that almost 90 percent of cyber-attacks are caused by human error – an employee mistakenly clicking on a phishing email or leaving their laptop out...
Giving employees the option to work from home is the wave of the future. More and more companies are putting work-from-home protocol in place to help not only keep employees happy with a flexible work schedule, but also to help benefit the company as a whole in the...
On June 10, 2019, Network Security Associate’s, Jeff Wagner, spoke at the Henderson Chamber Members breakfast, his presentation on network security focused on Password Protection. Below is a short summary on how to create a strong password. The longer the better A mix...
Though comprehensive process documentation is beneficial for many tasks, it’s essential when implementing technology to enhance your network security. Your process documentation must report the required steps to successfully complete a task or project, and it...
Technology updates are never fun for any business, but they’re increasingly important to ensure your business’s systems are safe and secure. Unfortunately, upgrading everything all at once just to get it over with isn’t a safe approach. The investment of time and...
So-called social hacks, also known as social engineering, involves attacks on what is perhaps the most vulnerable, easily compromised component in any computer system: The user. A social hack is any of a number of techniques, strategies, and tactics used to convince...
Microsoft Windows 7 and Server 2008 end of life means that Microsoft will no longer improve the product, accept warranty claims, or provide non-security hotfixes. Don’t wait until the last minute to update your Microsoft operating system, we highly recommend leaving 6...
Why do some companies fail their disaster recovery plan (DPR) audit? Perhaps because they did not get the right information for it. They say experience is the best teacher; thus, nothing beats what you can learn from real-world case studies. See what you can learn...
The cloud has grown in popularity in recent years and continues to do so. However, there are some common misconceptions about cloud services that still prevent people from trusting this technology. Here are some of the top myths about the cloud you shouldn’t believe....
As a small business owner, you know every dollar counts. Unfortunately, a single cyberattack can cost your business thousands of dollars and damage your reputation. This makes it essential for your business to achieve and maintain a high level of network security....
Every year my family asks me, “What would you like for Mother’s Day?” I often say something like, “I don’t know. Let’s just go out for dinner.” But, is that what I truly want? Dinner? At a crowded, noisy restaurant? Humm… Not this year. What DO I WANT? Good Question....
The Oregon Department of Human Services (DHS) recently reported a HIPAA data breach that exposed the personal information of more than 350,000 Oregon residents. The source of this breach was a phishing email with a malicious link that multiple employees opened and...
Once they fill out this form we will email them a link to download the file. This policy is helpful for letting employees know what is an is not OK on their PCs/the work network.
×
Searching For A New IT Company?
Schedule Your Complimentary IT Assessment & Consultation Using The Form Below.
×
Searching For A New IT Company?
Schedule Your Complimentary IT Assessment & Consultation Using The Form Below.
Schedule Your Complimentary IT Assessment & Consultation Using The Form Below.
×
Searching For A New IT Company?
Schedule Your Complimentary IT Assessment & Consultation Using The Form Below.