Password Protection Is Easier Than You Think

Password Protection Is Easier Than You Think

On June 10, 2019, Network Security Associate’s, Jeff Wagner, spoke at the Henderson Chamber Members breakfast, his presentation on network security focused on Password Protection. Below is a short summary on how to create a strong password. The longer the better A mix...
3 Process Documentation Best Practices

3 Process Documentation Best Practices

Though comprehensive process documentation is beneficial for many tasks, it’s essential when implementing technology to enhance your network security. Your process documentation must report the required steps to successfully complete a task or project, and it...
Social Hacks & How to Avoid Them

Social Hacks & How to Avoid Them

So-called social hacks, also known as social engineering, involves attacks on what is perhaps the most vulnerable, easily compromised component in any computer system: The user. A social hack is any of a number of techniques, strategies, and tactics used to convince...
4 Debunked Myths About Cloud Services

4 Debunked Myths About Cloud Services

The cloud has grown in popularity in recent years and continues to do so. However, there are some common misconceptions about cloud services that still prevent people from trusting this technology. Here are some of the top myths about the cloud you shouldn’t believe....
HIPAA Data Security Breach Checklist

HIPAA Data Security Breach Checklist

The Oregon Department of Human Services (DHS) recently reported a HIPAA data breach that exposed the personal information of more than 350,000 Oregon residents. The source of this breach was a phishing email with a malicious link that multiple employees opened and...