Happy 2018! For 40% of Americans, the new year means setting a New Year’s Resolution – have you made one? What about for your business? In 2018, we challenge you to make your (business) New Year’s Resolution to take data security seriously. But not just that – we challenge you to make cybersecurity a habit.Read More »
2017 is coming to a close, and we’re counting down our top blogs post of the year. Most of these posts weren’t written in 2017, but continue to be our most popular posts.
Not surprisingly, most of these focus on Office 365. We’re happy to see a security-based blog on here! Cybercriminals often target businesses based on the technology they use and knowing the red flags and warning signs to look out for is a huge step in the right direction towards keeping your business secure.Read More »
Picture this scenario: A low to mid-level employee gets an email from the CEO. He needs the lower level employee to wire him money right away and provides wire transfer information. An important client is upset, and they need this money to keep the client satisfied. Or the CEO is traveling, his wallet was stolen, and he needs money to be able to get a flight home.
The lower-level employee, not wanting to disappoint their superiors or their clients, comply and wire the money quickly, and without question. Except it’s not the CEO. It’s a cybercriminal, this was a phishing attack, and now the company is out thousands of dollars.
This scenario plays out all the time in businesses all over the world. Phishing attacks like these prey on your sense of urgency to scam you out of thousands of dollars.Read More »
If you’re a human, you’ve probably had at least one embarrassing moment in your career involving email. Maybe it was an awkward typo, or you called someone by the wrong name. Or you missed an email from a prominent client or your boss.
If you’re using Outlook for email, though, there are a few features and add-ins you can use to help check yourself – or at least give yourself a little extra time to catch your mistakes.Read More »
Picture this: One of your employees downloaded a malicious attachment from an email, and now some of your company’s files are encrypted. Your company has fallen victim to a ransomware attack. What do you do with the employee? If your answer involves punishing the employee, you need to think again, or you could be setting your company up for more attacks in the future.
One of the absolute worst things you can do for your company’s data security is punish employees for falling victim to a cyber attack. Let us repeat that: do not punish your employees for falling victim to a data breach.Read More »
Microsoft recently introduced Microsoft 365 – a suite of tools including Windows 10, Office 365 and Enterprise Mobility + Security (EMS) under one license. It’s an excellent solution for businesses looking to simplify their technology management while keeping their business secure.
But like everything else, it has its pros and cons and won’t be the right solution for every business.
Read More »
Phishing emails can be a big problem for businesses of every size. They can be difficult to detect and prevent and can cost you big time.
One of the reasons they’re so difficult to detect is because they can take on so many forms. A phishing email can look like anything. But there are patterns and some common types to be aware of:
Read More »
There’s probably a massive hole in your cybersecurity. It’s probably been there for years. You probably already know about it – you may even be the main culprit behind it. And you probably don’t even realize it’s a security risk: Shadow IT.
Shadow IT refers to the use of any hardware or software in a company that is not approved by the IT department. Examples include: employees using different software to edit photos, storing company files on their personal flash drives, or simply using a different internet browser to check their email.Read More »
One common question among businesses considering Office 365 is “Is it secure?” This is a great question to ask of any software, app, or company with access to your data (and should probably be asked more than it already is). The short answer is yes*, but a lot of the security is your responsibility.Read More »
A few members of our service team spent last week at Microsoft Ignite, the annual conference for IT admins, engineers, computer scientists and other technical folks. Most every Microsoft conference includes major product announcements, and Ignite 2017 was no exception.
Most focused on the tech side (hello, quantum computing), but there were also some product announcements that will likely affect the day to day of every employee – not just IT admins.
Here’s what you need to know:Read More »