Posts by John Mamon
7 PC Myths Costing Your Business Money
Evaluating your business technology budget? These 7 PC myths could be costing you a lot of money. From slow computers to hacker vulnerability, see how to fix it. Think you’re saving money by keeping those old PCs running in the office? Think again. An Intel study found that using a business PC that’s older…
Read MoreModern Phishing Email and Article Headlines That Fool Even Tech Professionals
Learn more about the kind of email phishing headlines that end up fooling the smartest tech professionals, and how you can better protect your business. Any tech professional worth their salt understands the damage wrought by unsuspecting users clicking on links inside “phishing” emails. It’s not surprising when tech-challenged individuals end up getting sucked…
Read MoreFive Golden Rules For Data Privacy
Your data and privacy deserve respect. Here are five golden rules for keeping yourself, your business, and your employees secure. Limit Who Has Access Keep information on a need-to-know basis. The more people that have access to a particular folder or file, the greater the risk of a data breach or exposure. Your employees should…
Read MoreAre Public Charging Stations A Security Threat?
Here’s a new cyber threat to worry about: Juice Jacking. Read on to learn what about juice jacking and how to prevent yourself or employees from becoming a victim. What Is Juice Jacking? One common feature of modern smartphones is that the power supply and data stream pass through the same cable. When you plug…
Read MoreHomeland Security Issues Rare Warning To Firefox Users: Update Now Or Risk Attacks
If your small business is using any but the latest, just-patched version of Firefox, you need to update now. That directive comes from no less than the United States Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). Whether you use Windows or Mac, older versions of Firefox for desktop contain a critical vulnerability…
Read MoreDoes Your Business Have All 6 Layers of IT Security?
If you don’t have proactive security measures in place to protect your IT network, it’s only a matter of time before it will be attacked. Enforce managed security is our unique 6 layered security approach that will ensure your business has the protection it needs to avoid a devastating data breach. Enforce UTM – a…
Read MoreDepartment of Homeland Security Offers Tips For Secure Online Shopping This Holiday Season
The U.S. Secret Service and the Cybersecurity & Infrastructure Security Agency, (both are under the oversight of The Department of Homeland Security) are offering their annual tips for staying secure online this holiday season. With U.S. retail e-commerce spending expected to top $135 billion this season, online criminals will be looking to take advantage of…
Read MoreYou Can’t Afford To Skip A HIPAA Risk Assessment
Neglecting to conduct a HIPAA risk assessment could cost you. In the first week of November, the Office of Civil Rights (OCR) announced two big HIPAA penalties. A $3 million settlement with the University of Rochester Medical Center for HIPAA violations in 2013 and 2017. A $1.6 million civil penalty imposed against the Texas Health…
Read MoreImportant Warning From The FBI
Hackers Now Using HTTPS To Trick Victims Via Phishing Scams Everything you’ve heard about the safety of https sites is now in question. According to a recent FBI public service announcement, hackers are incorporating website certificates (third-party verification that a site is secure) when sending potential victims phishing emails that imitate trustworthy companies or email contacts.…
Read MoreHow to Create a Strong Password You’ll Remember
Nearly every site or service we use online requires a username and password. Remembering hundreds of unique passwords is just about impossible, and reusing passwords across multiple sites can be dangerous. If one account is compromised in a data breach, any other account using that same password is at risk. Today’s username and password convention…
Read More