Archives
The office has been disinfected, work spaces are rearranged, and now we can begin our return to working in the office. But has the company planned for IT security challenges? Tab Bradshaw, Chief Operating Officer at Redpoint Security, has put together…
Read More
Category: Commercial, Education, Employees, Risk Management, Technology
Tags: backup, backup solutions, cyber, cyber security, cybersecurity, data, data restoration, information technology, loss prevention, malware, malware attack, Microsoft Office, multi-factor authentication, office, operating system, original equipment manufacturer, preventative maintenance, ransomware, risk management, software, vpn, web browser
We recently posted about Deepfakes being a new cyberthreat for 2021. There are a few more threats to be aware of this year, and knowledge about them is the best defense.
Read More
Category: Cyber, Home, Personal, Prevention, Technology
Tags: artificial intelligence, cyber security, cyberthreat, data breach, hackers, IoT, machine learning, malware, phishing, ransomware, technology
Back to school season is upon us. Many school officials, teachers, students, and families don’t know what this school year will look like, as the COVID-19 pandemic is affecting when and how students are returning to school. One thing everyone…
Read More
Category: Education, Personal, Prevention, Social Media, Technology
Tags: back to school, children, computer attack, cyber attack, cyber risk, cyberbulling, cybersecurity, e-mail spoof, kids, malware, online safety, Personal Cyber Protection, phishing scams, scams, students, virtual
Quarantine fatigue is not only sending people to crowded bars. We’re all getting tired of it—call it quaran-tigue—and that could spell trouble on the cybersecurity front.
Read More
Category: Business, Central, Commercial, Employees, Home, Personal, Prevention, Technology
Tags: cloud based services, cloud storage, computer, cyber, cyber attack, cyber crime, cyber security, CyberScout, cybersecurity, data backup, fatigue, firmware, malware, multi-factor authentication, pandemic, phishing, quarantine, quarantine fatigue, scam, scammers, scams, software, work from home, working from home
COVID-19 has forced people from their workplaces and schools. Working from home and homeschooling means that millions of Americans are using video conferencing for the first time. With this surge in new users, there will be many cybersecurity challenges. Here’s…
Read More
Category: Business, Commercial, Communication, Employees, Personal, Prevention, Technology
Tags: communication, computer attacks, cyber, cyber hygiene, cyber risk, cyber security, cyberattack, CyberScout, cybersecurity, data, hackers, Internet, malware, malware attack, mobile security, phishing, ransomware, scam, secure, security, smishing, vishing, webcam
We have probably all been to a public building where there are signs offering a free service to plug in your device at a charging location. Without thinking, we hurriedly plug in our device to the USB, by either using our…
Read More
Category: Personal, Prevention, Technology
Tags: cell phone, cyber security, cybersecurity, data, data backup, data breach, malware, malware attack, mobile device, mobile security, Personal Cyber Protection, personal data, personal information, personal insurance, protecting your data, smart phone, USB flash drive
Amanda, the chief logistics officer of a large wholesaler of office supplies, was excited about the start of Fall. It was getting cooler and the leaves were falling. Halloween was just around the corner, and that would mean the chance…
Read More
Category: Business, Central, Commercial, Risk Management, Technology
Tags: computer error, computer system, computer virus, corrupted file, CRM system, customer relations management system, cyber insurance, malicious software, malware, malware attack, worm
So your dear old grandma, who’s in the nursing home, bought a new Harley and appears to have gone on a road trip down to Daytona. Yeah, I didn’t think so. Identity theft is a major concern for many people,…
Read More
Category: Central, Financial, Personal, Prevention, Technology
Tags: bank statements, identity theft, Internet, malware, password, personal information, phishing, PIN, social security number
Take a moment to think of all the ways we have made things faster. Stick the words “instant,” “quick,” “speedy” or “express” in the name of something and now you can charge extra for it. From the packages we ship…
Read More
Category: Central, Technology
Tags: anti-virus software, applications, check disk, crashes, disk clean up, disk defragmenter, disk errors, malware, memory, PC, programs, speed, spyware, virus, windows