Categories
Security

Train Your Team to Spot High-Stakes Phishing

What Is Phishing? A scam by which an Internet user is duped (as by a deceptive e-mail message) into revealing personal or confidential information which the scammer can use illicitly. https://www.merriam-webster.com/dictionary/phishing Phishing Phishing is typically when a scammer attempts to get private information from a user. This information can be logins, credit card numbers, bank […]

Categories
Common Problems Informational

Common Technology Problems Affecting Small Businesses And How To Overcome Them

Small businesses face many challenges in day to day operations; and technology related problems are some of the most difficult to solve. In this article, we will discuss some of the common technology problems small businesses face and help you find where your business might be having issues. We will also help you decide where […]

Categories
Security

Remote Workforce Security Checklist

IT Checklist Enable Local Encryption Confirm all local admin accounts and ensure they use strong passwords Limit external sharing of cloud applications (OneDrive, SharePoint, etc.) Enable MDM for remote wipe capabilities Review and enable centrally monitored remote endpoint security tools Provide ability to securely exchange files and information externally and internally (OneDrive, DLP, email encryption, […]