IT Security Tips for Small Business

Because IT and cybersecurity are such an IMPORTANT issue, we are promoting a series of IT security articles with useful tips to show you and your employees how to significantly improve your protection from being a victim of cybercrime. Every business must make certain their employees are clear on how to appropriately use, handle and protect company data and devices.
Every time we focus on one simple, specific action you can take to avoid a potential data breach.
Browse the blog posts below for useful tips and information.

IT and Cybersecurity Tips Blog Archive

Top-Clicked Phishing Email Subjects

Think before you click! KnowBe4, a provider of security awareness training and simulated phishing attacks, has released statistics on the top 10 phishing email subjects that are opened by end-users. Drum roll please – the top 10 are: Password Check Required...

read more

What to Do About C-Level Fraud Attacks

C-level fraud attacks are an increasingly common attack vector, especially for SMBs. Generally, these attacks come in the form of spoofed emails from the “CEO” or another C-suite executive and ask the recipient to wire role power (people tend to do what the boss says)...

read more

Enjoy the Olympics – But Beware of Online Scams

We are now well underway with the enthusiasm and excitement associated with watching the 2018 Winter Olympics — including the parade of nations, fabulous performances, fireworks, and the intense competitions themselves.  Just a few of the elite USA athletes...

read more

Adobe Flash Player Update Scam: what you should know

Adobe Flash Player has unfortunately long been plagued with malware-related issues. The software has often been discovered to have vulnerabilities that make it possible for bad actors to spread malware. The most recent vulnerability was discovered in October of this...

read more

7 Must-Haves for a Secure Remote Access in Your SMB

Now that cloud technology has made access to information more convenient, with a promise to make your business life easier, the risk of data security has increased. Cloud servers are susceptible to attacks. Insecure or insecurely used remote access technologies –...

read more

Alarming Pop-ups: how to handle a browser hijacking

When browsing various website on the Internet, you might come across pop-ups – a common occurrence, and frankly, a nuisance. Some pop-ups are the sales chat window, some are advertisements. But there are also other, malicious types: false ads and scareware...

read more