Cybersecurity Tip: Use STRONG passwords!
Use STRONG passwords! Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five ...
Work computers and devices are only for ONE thing…
That is, WORK! Never mix personal web surfing and social media with company devices. If you want to check your Hotmail account or Facebook page, do it during your lunch break and on YOUR personal device. Over 600,000 Facebook accounts ...
The DANGERS of Dropbox and other file sync apps
If you're using Dropbox, OneDrive, Google Drive or other consumer-grade file sync and sharing cloud applications, listen up! These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of ...
What to do BEFORE you go to Starbucks
So you're in the car on the way home from Starbucks, basking in the glow of consuming your triple-shot, low-foam, extra-hot pumpkin-spice latte when you suddenly realize your laptop has gone missing. You drive back like the caffeinated lunatic you ...
REMOVE that unwanted freeware
Like it or not, PC manufacturers LOVE to stuff your brand-new PC full of "free" applications (they get paid to do it, so you've got a slim chance of getting one without a side of spamware). But clutter is the ...
Bookmark the LEGITIMATE web sites you frequently visit
Here's a sneaky trick used by many hackers: they purchase and set up a fraudulent web site that is a close misspelling of a legitimate one. Example: www.faceboook.com instead of www.facebook.com. All you have to do is accidentally fat-finger ONE ...
Never use PERSONAL devices to connect to COMPANY data
You're a hardworking team player who likes to check e-mail and get a few things done after hours – all good! But here's something you might not know: you should never access company data, file servers, or applications through personal ...
How to spot a phishing e-mail
A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a ...
How To Foil Ransomware
Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that's the number reported – the real numbers are probably MUCH higher). The threat ...
If This Type of Alert Pops Up, DON’T Click on it!
You're working at your computer when all of the sudden – BAM! – you get a pop-up notification that your PC is infected with a virus and you must "click here" to run a scan or install antivirus software. This ...