Tag Search: passwords

IT policies to protect your business

Posted on Monday July 23, 2018  |  security, policies, passwords, internet, employee handbook, email, data

Employees are one of your biggest security holes. There is no foolproof prevention method for human error, which is why employee mistakes are one of the most common causes of a security breach. To reduce potential risks, we've suggested a few IT policies you should implement to protect your business.

 

Router malware worse than experts realize

Posted on Wednesday June 20, 2018  |  cybersecurity, factory reset, hardware, malware, man in the middle attacks, passwords, router, vpnfilter

In May, security experts discovered one of the most widespread malware infections in history. Now, they're warning businesses and consumers that it's even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn't taken action against it.

 

What Is Single Sign-On and Who Is It For?

Posted on Tuesday February 20, 2018  |  sso, single sign on, security, passwords, office 365, logins, identity as a service, google

Statistics show that the average enterprise uses more than 90 cloud services. Even if small businesses use less than half that number, securely managing account logins is still a huge problem for users and administrators. Single Sign-On (SSO) is an excellent solution to this issue, so let's dive into how it works.

 

Think before saving logins to your browser

Posted on Tuesday January 09, 2018  |  web browsers, safari, privacy, passwords, firefox, cybersecurity, chrome, auto fill

There are a number of reasons you should be wary of saving your password to a digital platform. Just look at Yahoo’s data breach in 2013, which leaked passwords for three billion people. Even when your password isn’t compromised, saving it to a browser could have serious implications for your privacy.

 

Google studies effects of leaked logins

Posted on Tuesday November 21, 2017  |  research, phishing, passwords, multi factor authentication, keylogging, google, data breach, account hijacking

Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results.

 

Learn from this NFL team's EMR fumble

Posted on Wednesday June 15, 2016  |  washington redskins, theft, security, passwords, nfl, hipaa, healthcare, emr

2016June15_HealthcareArticles_AESPN recently reported that a laptop containing the medical records of thousands of NFL players was stolen from the car of a Washington Redskins' trainer. And while the team released a statement saying no health information protected under HIPAA guidelines was at risk, the incident shows that EMRs are vulnerable no matter the size of your company. That's why you need to have all medical records completely protected no matter where they are being stored.

 

Page:   12345

Celebrating 35+ Years

Off-Site Cloud Backups

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016