Social media safety

Social media safety

Have you ever received a Facebook friend request from your mom even though she is already a friend of yours on Facebook? So, you call her up to make sure she didn’t forget her password again and just create a new FB page. Then right after that, “she” sends you a video link saying you’re in a YouTube video.

Who’s stealing all the bandwidth?

Who’s stealing all the bandwidth?

Not so long ago it would have been ridiculous to ask a new employer to give you free TV, movies, mail, music, and a camera in case you wanted to work from home and conduct a meeting with coworkers. Yet, with the internet, all of these things and more are at the fingertips of most office employees.

Cloud Etiquette 101

Cloud Etiquette 101

Horrible house guests, we’ve all had them. Whether it be that annoying family member that over stays their welcome, or that old college buddy that leaves beer cans and potato chip crumbles all over your couch, we have all experienced those discourteous visits.

Transitioning to the Cloud

Transitioning to the Cloud

Data loss is not a matter of if, it’s a matter of when – and it happens to every company, big or small. More than half of businesses locate their disaster/backup systems in the same physical location as their primary system – red alert! If you only have one copy of your system’s backup at your office, and your hardware fails or a breach occurs and all your data is stolen, then a backup was completely useless to begin with.

To Cloud, or Not to Cloud

To Cloud, or Not to Cloud

Everyone is talking about cloud computing these days and for good reason. The cloud is revolutionizing how computing power is generated and consumed. Cloud refers to software and services that run on the Internet, instead of locally on your computer. When tech companies say your data is backed up “in the cloud,” it has nothing to do with those white fluffy things in the sky.

Fixing Your Weakest Link: Your Employees

Fixing Your Weakest Link: Your Employees

You can have every piece of security hardware in the books: firewall, backup disaster recovery device, anti-virus; but your employees will still be the biggest vulnerability in your organization when it comes to phishing attacks. How do you mitigate as much risk as possible?

Create and Strictly Enforce a Password Policy: Passwords should be complex, randomly generated, and replaced regularly.

How To Spot A Phishing Attack

How To Spot A Phishing Attack

Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing sites every month, a 65% increase in attacks in the last year, and hackers would have moved on to their next idea for swindling people out of their identities and money.

What Is Phishing & How Are Hackers Using It?

What Is Phishing & How Are Hackers Using It?

While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% in the last year.

It’s time to re-think your password

It’s time to re-think your password

In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses, federal agencies, and academic institutions. Recently, however, the institute has reversed its stance on what makes for truly secure password practices.