Skip to content

View all posts

5 Ways to be Cyber Secure at Work

Businesses face significant financial loss when a cyber-attack occurs. In 2018, the U.S. business sector had the largest number of data breaches ever recorded. Cybercriminals often rely on human error - employees failing to install software patches or clicking on malicious links - to gain access to systems. From the top leadership to the newest employee, cybersecurity requires the vigilance of everyone to keep data, customers, and capital safe and secure. Support a culture of cybersecurity at your organization.

Read More

10 Cybersecurity Tips for Businesses

The Internet allows businesses of all sizes and from any location to reach new and larger markets, and provides opportunities to work more efficiently by using computer-based tools. Whether a company is thinking of adopting cloud computing or just using email and maintaining a website, cybersecurity should be a part of the plan.

Read More

Tech Support Scams

You get a phone call, pop-up, or email telling you there's a problem with your computer. Often, scammers are behind these calls, pop-up messages, and emails. They want to get your money, personal information, or access to your files. This can harm your network, put your data at risk, and damage your business. The scammers may pretend to be from a well-known tech company, such as Microsoft. They use lots of technical terms to convince you that the problems with your computer are real. They may ask you to open some files or run a scan on your computer - and then tell you those files or the scan results show a problem - but there isn't one.

Read More

Ransomware

Ransomware has rapidly emerged as the most visible cybersecurity risk playing out across our nation's networks, locking up private sector organizations and government agencies alike. And that's only what we're seeing - many more infections are going unreported, ransoms are being paid, and the vicious ransomware cycle continues on. We strongly urge you to consider ransomware infections as destructive attacks, not an event where you can simply pay off the bad guys and regain control of your network (do you really trust a cybercriminal?).

Read More

Online Privacy

The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide personally identifiable information (PII) such as your name, date of birth, account numbers, passwords, and location information.

Read More