Securing Sensitive Data – Don’t Make THESE Mistakes

In today’s world of digital transformation and cloud computing, it is more important than ever to secure and protect your critical files and sensitive data. It is surprising to see how many companies regularly make simple mistakes that result in expensive breaches and loss of data. Here are the biggest mistakes security experts still see… Read More »

Cyber Trends That Will Shape 2017

The world of cyber crime and hacking has made the internet a pretty scary place over the past couple years. In fact, 2016 is thought by many to be the most unsecure year to date with numerous cyber attacks on individuals, corporations, websites, and governments. While it’s all but impossible to give up our dependence… Read More »

Understanding Cyber Safety When Traveling | Should You Connect Your Phone to Mobile Hot Spots?

With holiday travel season just around the corner, cyber security should be at the top of your list of concerns. While working from a secure location, or accessing your personal network, you can be more or less confident that your actions online are not being tracked or that you are unwittingly giving criminals access to… Read More »

Going Back to the Basics: How to Create a Computer Password That Can’t be Easily Accessed

Amazingly, people still get caught using terrible passwords on their online accounts. This might seem like a small risk to take, but hackers are getting smarter about guessing user’s credentials. Passwords like “PASSWORD” “123456” and others are commonly used but easily guessed even by amature cyber criminals. It’s important to use high-quality passwords that don’t… Read More »

Is Document Destruction More than Tearing Up a Sensitive Piece of Information?

Yes! There is so much more to destroying a document properly than ripping up some paper and throwing it in the trash. Something so easily destroyed is easily reassembled and your information is not secure. There are issues of properly managing hard copy document destruction, digital file destruction, compliance issues, and waste management as well.… Read More »

Where do you store your old files? And is it time to make that digital?

File storage is costly. Finding the space and the organizational system that works for you can be tricky too. You’re likely familiar with the rows on rows of filing cabinets that seem like a black hole for important files and documents that many businesses find themselves stuck with. Nobody likes them, but what are the… Read More »

How to Respond if a Hacker Does Get Into Your Database

Database breaches are a very real risk for both enterprise and small or medium size businesses. Doing everything you can to prevent such attacks is important, but even the most secure systems sometimes find themselves at risk. Single-tenant breaches that result from stolen user IDs and passwords are a reasonably common occurrence. They often stem… Read More »

The True Impact of One Employee Letting Their Computer Password Leak

We live in incredible times. Our mobile and digital world is super productive but if we’re not careful we can easily put ourselves and our businesses at risk. As recent news has shown us, security is a very real issue. Cybercrime is at an all-time high. The explosion of IoT and the increased use of… Read More »

Why You Need to Educate Your Team on Cyber Security

Cyber security is a growing concern for many professionals. Stolen identities, phishing, and computer viruses are some of the more common dangers many individuals and corporations are familiar with. More high-level attacks such as ransomware should also be on your radar. Hackers are getting more and more organized and proficient in gaining access to information… Read More »