Internet Security – Mistaken Beliefs – Part 4

blog-tags
Author Image
by: Kara S.
It’s time once again to learn about Mistaken Beliefs when it comes to your security on the internet. When it comes to Internet security, what you think you know can hurt you. A lot of what passes for common sense about this subject is just plain wrong—and often risky. Below are some…

Internet Security – Mistaken Beliefs – Part 5

blog-tags
Author Image
by: Kara S.
This week is our last week of our series on Internet Security. Thank you for reading! When it comes to Internet security, what you think you know can hurt you. A lot of what passes for common sense about this subject is just plain wrong—and often risky. Below are some more common…

Cybercrime: Protect Yourself and Your Business

blog-tags
Author Image
by: Kara S.
There are two points a manager or owner of a small- or medium-sized business (SMB) should understand: SMB’s are as vulnerable to cyber attacks as large enterprises, if not more. Cybersecurity for SMB’s is not rocket science. Let’s break these down. Explanation of the first item is rather simple: lack…

Protecting Yourself from Text and Email Phishing

blog-tags
Author Image
by: Beka W., Graphic Designer II
According to a 2015 Verizon Data Breach Investigations Report, more than 23% of people open phishing messages, and 11% open attachments in these messages. Now you may be asking, what is phishing? Phishing is the act of using fraudulent, but official looking, emails, text messages and websites to trick a…