Tech Insights

rss

Contributor Columns on Information Technology and Security

Fotolia_147432708_XS1.jpg

Do you have employees who bring mobile phones to work and use those devices on the corporate network? Do they store company data on these “Bring Your Own Devices (BYOD)”?? Does your company have a policy in place for this? First, the moment a person brings in their personal phone ...

Fotolia_80058986_XS1.jpg

Burglars get burgled, muggers get mugged, and hackers get hacked. This includes a sophisticated ring of hackers: Hacking Team, hailing from Italy, specializing in selling hacking software to major governments. An article on wired.com describes how a “400 gigabyte trove” went online by anonymous hackers who gutted the Hacking Team, ...

Fotolia_224304641_XS.jpg

If you are thinking of jumping onto the Bitcoin bandwagon, or any type of cryptocurrency, you have to make sure that you are watching out for scams. There are a ton of them out there, including the following: Fake Bitcoin Exchanges You have to use a Bitcoin exchange if you want ...

Fotolia_64081475_XS.jpg

So someone comes up to you in a restaurant—a complete stranger—and asks to look at your driver’s license. What do you do? Show it to that person? You’d have to be one loony tune to do that. However, this same blindness to security occurs all the time when a person ...

fotolia_26296633.jpg

Think about how great this would be: Imagine that all of your company data is safe from hackers. Your hardware is totally safe and secure. You have IT specialists at your disposal at all times and have a constant flow of cash to pay them. Unfortunately, this is a fantasy ...

Fotolia_133819533_XS.jpg

Not all viruses that find their way onto your computer dramatically crash your machine. Instead, there are viruses that can run in the background without you even realizing it. As they creep around, they make messes, steal, and much worse. Malware today spies on your every move. It sees the ...

Man_looking_up_in_sky.jpg

Proposals are one of the most expensive things you will spend your time on in a small business (or a large business, for that matter). You not only spend tons of time discovering and understanding what the client needs, but you also spend countless hours (often late at night) ...

Fotolia_58169302_XS.jpg

Most small businesses don’t put as much focus on internet security as they probably should. If you are a small business owner or manager, not focusing on internet security could put you in a bad spot. Are you believing the myths about internet security or are you already using ...

fotolia_61261020.jpg

There are many ways that you or a small business could get caught up in a social media disaster. Can you think of any off the top of your head? If you are like most of us, probably not. Here are 14 ways that you could be in danger: A ...

Fotolia_49393987_XS.jpg

Social media is an excellent tool for small businesses, yet, the use of social media by small business staff can definitely put the company in danger. Many small business owners and managers don’t realize this. Recently, I was talking to employees of a credit union about what to do in ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its