Join the IT Specialist Breach Prevention Program 

Start with a Free Dark Web Scan and Baseline Security Assessment. Your Protection is on Us!

Tech Insights

rss

Contributor Columns on Information Technology and Security

Fotolia_144694435_XS.jpg

At the start of the year, we all made our resolutions for 2022. Now it’s July—how are you doing on your resolutions? If you’ve already broken a few, no worries; New Year’s doesn’t have the monopoly on making goals to better yourself. This is especially true with digital safety. ...

Data Center.jpg

It Starts at Home Now that October has been designated National Cybersecurity Awareness Month (CSAM) by the National Cyber Security Alliance and the United States Department of Homeland Security, we are seeing promotional material from a variety of public-facing businesses.  Everyone from our banks to our credit cards to the grocery store is ...

Two_Factor_Auth.jpeg

The current situation has forced most companies to start working remotely. Hackers see this as the perfect opportunity to exploit vulnerabilities. Every time a remote employee connects to the company network, it is an additional access point that can be exploited. Active Directory (AD) is the core identity and access ...

two-factor-authentication3.jpg

The reality is that, if you don’t have Multi Factor Authentication (MFA) in place, and your employees fall for phishing scams or share passwords, well, your company is widely open to attacks. Compromised credentials represent one of the biggest security threat in today’s world. The reason is simple, compromised credentials ...

Fotolia_114026330_XS.jpg

Not all computer viruses immediately crash your device in a dramatic display. A virus can run in the background, quietly creeping around on its tip-toes, stealing things and messing things up along the way. If your computer has a virus, here’s what may happen: Windows suddenly shuts down. Programs automatically start ...