In this digital, online age, technology is a critical part of most businesses. As small to medium sized business grow, they face the challenge of managing their information technology.
The short video below is a step-by-step explanation of how to setup two-factor authentication (2FA) for Microsoft 365 using the Authenticator app
Hackers love the holidays. Everyone loves a long holiday weekend, especially hackers. While you and your team are busy preparing for holiday celebrations-wrapping up presents at home and projects at work-hackers are ramping up their efforts to hack into your network and steal a few presents of their own. https://vimeo.com/657680828/1f529396eb Why do they love long holiday weekends? Team members take time off: Hackers know there are […]
QR Code Security: To scan or not to scan QR codes are more popular than ever. This is especially true in the food service and entertainment industries given efforts to decrease contact touch points during the pandemic. They’ve replaced menus in restaurants and promotional materials. You’ll find them on posters, brochures, and postcards in the mail. I just scanned one at church last week to fill out a survey. […]
Email phishing attacks [fraudulent emails attempting to get personal information or gain access to a network] significantly increased when the pandemic hit in 2020. While many of us worked from home, cyber criminals seized the opportunity to find more victims. Phishing attempts increased from 25% to 36% in frequency (Verizon 2021 Data Breach Investigations Report). […]
C-Level IT Consulting Good business leaders know they can’t be experts in all aspects of their business. This is especially true when it comes to technology. For larger organizations, this isn’t a problem. They can hire their own Chief Financial Officer (CFO) to manage the accounting and their own Chief Information Security Officer (CISO) for […]
Cyber security is a hot topic these days. The Colonial Pipeline cyber-attack in May of 2021 and its fallout is a reminder to business leaders that any business can be attacked. This includes small to medium sized businesses (SMB). Security breach statistics prove it. The distance between the number of large business and small […]
Hiring IT Employees vs. Hiring an IT Company As your business grows, your IT needs will change. It’s inevitable. If you’ve been doing IT yourself with the help of a designated employee, you may find you no longer have the time to manage your business and your IT. The next logical step is to either […]
How do you know if your business has actually been hacked and what do you do if you have a real security incident?
This short video explains two-factor authentication, how it works, and why it’s so important to secure your email accounts and data.