Email phishing criminals came up with new ways to trick your employees last year. The worse news is that the old tricks are working, too. Why are employees less vigilant? … Continue reading Did You Know your Employees are even more Vulnerable to Email Phishing than before the Pandemic?
Apache’sLog4j is an innocuous name for a bit of software currently setting the security world on fire. It’s free and used in all sorts of software applications. Developers insert Log4j … Continue reading How to Handle the Latest Cybersecurity Fire around Log4j Known as LOG4Shell
An article from 2017 lists thirteen technologies safer than passwords. Such as vein scans, ear scans, eye scans, and fingerprints. Are we any closer in 2021 to ditching the use … Continue reading Why Four Years Later We’re Still Using Passwords When Safer Technologies Exist
Did you know your company’s intellectual property can include employee know-how? With the great resignation in full swing, are your patents, copyrights, and trade secrets, including employee know-how, safe? Here’s … Continue reading How to Keep Your Intellectual Property from Walking out the Door Never to be Seen Again
Does it seem technology moves at light speed, and your company is falling behind? Don’t worry; it depends on how you look at it. Big data, AI, and mobile technology … Continue reading A Few Basics on How to Achieve the Best Technology Choices for Your Company
Do you know what mobile apps access your business network? A recent report issued by NetSkope indicated 97% of cloud apps are uncontrolled freebies. With many working from home due … Continue reading Do You Know All the Apps Sniffing Around In Your Business’ Network?
Cybercriminals continue to attack governments and companies around the world. It’s a global problem, and it’s growing. In the first quarter of 2021, companies in Australia, the US, Taiwan, and … Continue reading How Hash and Encryption Algorithms Replaced Secret Messages to Protect Business Databases and fend off Cybercriminals
Cybercriminals and ransomware made headlines this week. The Colonial Pipeline suffered a double extortion where stolen data is encrypted, and then a ransom demanded, or else the data will be … Continue reading How to Avoid Extortion at the Hands of Cybercriminals
This article title caught my attention the other day; Garbage Is Using Blockchain. Another article listed managed blockchain as a popular trend for this year. With Bitcoin soaring, it’s no surprise the underlying technology … Continue reading How Blockchain Can Help Your Small Business Now and in the Future
Has a hacker constructed a backdoor in your network? The attack on Microsoft’s Exchange Server email software is all over the news because hackers used its vulnerabilities to establish backdoors. … Continue reading What It Means When a Hacker Opens the Backdoor to Your Business Network and How to Shut It
I once spent hours pulling together three reports to generate one critical supply chain report for management. Why? A consultant convinced the business an ERP system they tweaked could handle … Continue reading The Secret Ingredient in the Best Technology for Small Business
A phishing attack test? Yes, a great way to educate employees about the dangers of phishing and how to recognize it. The emphasis should be on educating, not criticizing. What’s … Continue reading The Best Ways to Use Phishing Attack Tests Without Hooking and Landing Your Employees