In a 2018 survey, small firms used an average of 73 software applications. That number has been rising steadily over the years and is almost certainly higher now. The average employee has to log into multiple business applications each week ranging from company email to customer relationship management (CRM) systems. Each would require a distinct […]
Social Engineering Tactics. How to Recognize and Avoid
Social engineering isn’t the first thing that comes to mind when most people think about cyberattacks. Yet, social engineering is consistently the most widely used avenue for breaking through an organization’s cyber defenses. Even when hackers use technical means to break through a system, there will often be some social engineering involved to obtain login […]
How to Limit Company Exposure When You Lose Your Phone or Laptop
COVID-19 drove conversation on remote work to the fore. A substantially larger number of people are working from home than there was pre-2020. With remote work and telecommuting comes an elevated risk of losing company laptops and phones.
Wi-Fi 6 – Why You Should Consider Upgrading
It’s been more than two years since the 802.11ax wireless networking standard made its debut. More commonly referred to as Wi-Fi 6, there is today a raft of routers and devices built to make the most of these new technologies. As with any new standard, upgrading is not always necessary.
Why Your Remote Team Should Put IoT Devices on a Separate Wi-Fi Network
Working from home is a part of life now for many companies. From small businesses to large enterprises, employees are transitioning to an at-home and hybrid working model.
Should Our Business Consider Using Windows 365 Cloud PCs?
Many business activities that used to be location-dependent are now in the cloud. This includes things like accounting software that used to reside on one computer and can now be accessed by anyone in the company through a cloud application.
5 Major Phishing Mistakes to Avoid That Leave You Vulnerable
Is your company making some mistakes that increase your risk of a phishing attack? Simply forwarding a phishing email or not reinforcing security awareness throughout the year can put you in a higher risk category than a company that builds security awareness into its “business as usual.”
Cloud Storage is Not Immune to Ransomware
Ransomware has become the most feared type of malware attack because it can essentially shut down a business quickly and cost hundreds of thousands of dollars in remediation.
Public USB Charging Stations: Are They Safe? What to Look Out For
Our smartphones have become almost an extension of ourselves that we can’t do without. 53% of Americans say that they have never gone longer than 24 hours without their phone, and 74% say they feel uneasy about leaving their phone home when they go out.
Top Social Engineering Tricks to Look Out for When Protecting a Business
Social engineering is a tactic that’s been around since before those snake oil salesmen in the old west traveled from town to town with their wagons selling scam cures.