Blog

MOST POPULAR

Warning: Your Employees Have Your Sensitive Data in Their Cloud

Our last blog post alerted you to the dangers of combining employees who take technology for granted with a weak (or non-existent) BYOD policy. However, that’s not the only risk a tech-savvy workforce can pose to your data. A survey by cybersecurity vendor CipherCloud found that a jaw dropping 86 percent of cloud applications being used in the enterprise, from…

How to Harness the Power of Cloud Services for Cybersecurity Conscious Organizations

According to a recent study by Verizon, from survey to survey, the trend is clear – the cloud is now mainstream. Verizon research found that 65% of enterprises surveyed are using cloud services, and they are increasingly trusting more complex and mission-critical workloads to it. They also found that 72% expect to put more than half their workloads in the…

5 Lies Cybercriminals Tell to Get You to Click Malicious Links

Read time: 60 seconds
The numbers are staggering. Each day, 156 million phishing emails are sent. Spam filters catch about 90% of them, but that still means 16 million phishing emails make it through to recipients’ inboxes, where half are opened. Out of the 8 million emails opened, 800,000 of them lure recipients into clicking a link. That simple act can lead to malware being installed,…

Business Email Scams in the Year of the Pandemic

Read time: 60 seconds
In BEC attacks, cybercriminals pose as company executives, supplier reps, lawyers, and other business professionals to con organizations into sending them wire transfers and sensitive data (e.g., bank account numbers, gift card numbers). Despite the pandemonium from the coronavirus pandemic, BEC scammers stole an unprecedented $1.9 billion from their victims, according to IC3’s “2020 Internet Crime Report“.  This all-time high is continuing to…

April 13 is Identity Management Day

Read time: 45 seconds
In a world defined by our use of technology, how we are identified digitally is important. Our digital identities and the credentials that protect them define how we work, interact with each other, access technology, execute transactions, and so much more.  For organizations, Identity and Access Management (IAM) “is the discipline that enables the right individuals to access the right…

How to Minimize the Impact of Severe Weather on IT Systems

Read time: 90 seconds
A recent report has confirmed what many people have suspected: 2020 was plagued by severe weather. In the United States alone, a record-breaking 22 weather and climate disasters earned the unwanted distinction of causing $1 billion or more in damages. Combined, these 22 events resulted in 262 deaths and $95 billion in damages.  The severe weather does not seem to be letting…
Bay Area IT Services | IT Support & Consulting

Microsoft IE 11 Nears Deadline to Stop Supporting 365 Apps & Services

Read time: 45 seconds
Internet Explorer has been phasing out for the last five years and Microsoft is now launching its newest version of ‘open-source browsing’ Microsoft Edge.  The Beginning of the End Consumers have been using Internet Explorer 11 since 2013, when browsing experiences were far less advanced and accommodating.  As browsers progressed, open-source standards have risen to new heights and set the standard for…
Outsourced cybersecurity for business

What You Need to Know Now About the CPRA

Read time: 30 seconds
The California Privacy Rights Act (CPRA), which passed in November 2020, is a comprehensive privacy law that provides significant protections to people who live in California. If your company has more than $25 million in annual revenues and handles the data of California residents, the CPRA will apply to you, regardless of where you’re located. That makes it critical to start getting legal advice and planning your compliance strategy now.   When the CPRA goes into effect on January 1, 2023,…

Microsoft Windows 10/10X Provides Users with Innovative Tools and Security Options

Read time: 60 seconds
Windows 10/10X design aims for simplification and has integrated an adaptive experience to optimize user preference for streamlined daily use and productivity.  Privacy for Edge Users Windows 10 ‘Version 20H2’ is the first to come with the redesigned Microsoft Edge browser installed by default. The browser is now built on Chromium, Google’s open-source foundation for the Chrome browser, which makes…

Best Practices for Browser Privacy

The only true way to keep business, advertisers, and cyber criminals from monitoring and profiling your online activity in uncomfortable detail is not to go online at all. But since that’s not a reasonable option for most of us, your next best choice is to make it harder for cookies, trackers, beacons, and other technologies to follow you around the…

4 Useful Features That Are New in Microsoft Edge

Read time: 45 seconds
Microsoft began a phased rollout of the newest version of its Chromium-based web browser on January 21, 2021. Version 88 of Microsoft Edge offers many enhancements, including four new features that will likely prove useful no matter whether you are using the browser at work or at home. After your Edge browser is updated (it might a take several weeks…

2 Digital Trends to Keep in Mind in 2021

Read time: 90 seconds
By keeping abreast of current trends, business professionals can find out about threats and opportunities that might lie ahead. This information can help them chart the best course forward for their companies.  Here are two digital trends business professionals should keep in mind when they establish their digital strategies and business plans for 2021:  1. The Coronavirus Pandemic Is Changing Customers’…

Cybersecurity for the New Normal

Read time: 30 seconds
It seems likely that some of the changes COVID-19 forced on us have been popular enough to become business as usual – especially a shift toward long-term and even permanent work-from-home policies. But if your organization doesn’t plan to return to the office for many months to come (or at all), you’ve got cybersecurity challenges you didn’t have in pre-pandemic times. And that means…

Seven Steps to Building a Strong Cybersecurity Strategy

If it seems like we’re spending a lot of time talking about cybersecurity lately, you’re not imagining things. Between the need to secure systems so employees can work effectively from home and a massive uptick in cyberattacks, security is at the top of everyone’s agenda, including our own. This step-by-step checklist for building an effective cybersecurity strategy is written for CIOs, but we think it’s useful…

Today is Data Privacy Day

Read time: 20 seconds
Data Privacy Day is Jan. 28, just like it is every year. But as with everything else, COVID-19 has forced us to reconsider a new normal for enforcing data privacy in the work-from-home (WFH) environment. Sponsored by the National Cyber Security Alliance (NCSA), Data Privacy Day is designed to “inspire dialogue and empower individuals and companies to take action” on…

​Share with Care: Manage Privacy Settings

Share with care, what you post can last a lifetime. Update the privacy settings on at least one of your online accounts this Data Privacy Day, January 28.  Want to view your privacy/security settings, but don’t know where to find them? Click here for direct links to update your privacy settings on popular devices and online services.  

Six Steps to Protecting Sensitive Data in the Cloud

Read time: 45 seconds
You understand the importance of protecting sensitive and proprietary data. You’re careful to choose cloud vendors with strong security controls. But is your own use of cloud services giving bad actors an opening to breach your protections?   It sure is. At least according to Gartner, which projects that through 2025, 90% of the organizations that neglect to control their use of public cloud will share sensitive…

Health Care Warning: Beware of Pandemic Phishing Attempts

Read time: 30 seconds
Hospitals and other health care organizations need to tighten up their email security protocols and boost their anti-phishing training to fend off growing cyberattacks that use requests for COVID-19 data to try to penetrate IT systems.  CEOs at several Massachusetts hospitals recently received requests for COVID-19 statistics in emails that appeared to come from US Department of Health and Human Services. However, the emails included external links that…

Preparing for Post-Pandemic IT Needs

Read time: 45 seconds
Now that vaccines are becoming available for COVID-19, there’s a light, however distant at the end of the tunnel. Smart business leaders are already starting to think about how to use technology better now to prepare themselves for the post-pandemic future. These five strategies will help you get a head start:  Leverage automation, AI, and cloud services to take more flexible approaches to work and make your organization…

Blog

MOST POPULAR

3 Reasons Why You Shouldn’t Click “Unsubscribe” Links in Emails

Using “Unsubscribe” links might seem like a good way to prevent junk emails from cluttering your inbox but doing so is risky and can lead to unforeseen consequences. Here are three reasons why you should avoid clicking “Unsubscribe” links in emails: 1. You Might End Up Getting More Rather Than Fewer Emails When you click “Unsubscribe”, you are letting the…

The Executive Order that will Require Software Vendors to Notify Government of Cybersecurity Breaches

The Biden administration is planning to issue an executive order that will require many software vendors to provide notification when they experience a data breach, according to a recent draft. Reuters reported on March 25, 2021 that the order will affect companies whose customers include agencies of the federal government. The administration could issue the order as early as March 31, although…

5 Lies Cybercriminals Tell to Get You to Click Malicious Links

Read time: 60 seconds
The numbers are staggering. Each day, 156 million phishing emails are sent. Spam filters catch about 90% of them, but that still means 16 million phishing emails make it through to recipients’ inboxes, where half are opened. Out of the 8 million emails opened, 800,000 of them lure recipients into clicking a link. That simple act can lead to malware being installed,…

Business Email Scams in the Year of the Pandemic

Read time: 60 seconds
In BEC attacks, cybercriminals pose as company executives, supplier reps, lawyers, and other business professionals to con organizations into sending them wire transfers and sensitive data (e.g., bank account numbers, gift card numbers). Despite the pandemonium from the coronavirus pandemic, BEC scammers stole an unprecedented $1.9 billion from their victims, according to IC3’s “2020 Internet Crime Report“.  This all-time high is continuing to…

Strategic, Reliable, and Secure. Learn more about our services.

April 13 is Identity Management Day

Read time: 45 seconds
In a world defined by our use of technology, how we are identified digitally is important. Our digital identities and the credentials that protect them define how we work, interact with each other, access technology, execute transactions, and so much more.  For organizations, Identity and Access Management (IAM) “is the discipline that enables the right individuals to access the right…

How to Minimize the Impact of Severe Weather on IT Systems

Read time: 90 seconds
A recent report has confirmed what many people have suspected: 2020 was plagued by severe weather. In the United States alone, a record-breaking 22 weather and climate disasters earned the unwanted distinction of causing $1 billion or more in damages. Combined, these 22 events resulted in 262 deaths and $95 billion in damages.  The severe weather does not seem to be letting…
Bay Area IT Services | IT Support & Consulting

Microsoft IE 11 Nears Deadline to Stop Supporting 365 Apps & Services

Read time: 45 seconds
Internet Explorer has been phasing out for the last five years and Microsoft is now launching its newest version of ‘open-source browsing’ Microsoft Edge.  The Beginning of the End Consumers have been using Internet Explorer 11 since 2013, when browsing experiences were far less advanced and accommodating.  As browsers progressed, open-source standards have risen to new heights and set the standard for…
Outsourced cybersecurity for business

What You Need to Know Now About the CPRA

Read time: 30 seconds
The California Privacy Rights Act (CPRA), which passed in November 2020, is a comprehensive privacy law that provides significant protections to people who live in California. If your company has more than $25 million in annual revenues and handles the data of California residents, the CPRA will apply to you, regardless of where you’re located. That makes it critical to start getting legal advice and planning your compliance strategy now.   When the CPRA goes into effect on January 1, 2023,…

Microsoft Windows 10/10X Provides Users with Innovative Tools and Security Options

Read time: 60 seconds
Windows 10/10X design aims for simplification and has integrated an adaptive experience to optimize user preference for streamlined daily use and productivity.  Privacy for Edge Users Windows 10 ‘Version 20H2’ is the first to come with the redesigned Microsoft Edge browser installed by default. The browser is now built on Chromium, Google’s open-source foundation for the Chrome browser, which makes…

Best Practices for Browser Privacy

The only true way to keep business, advertisers, and cyber criminals from monitoring and profiling your online activity in uncomfortable detail is not to go online at all. But since that’s not a reasonable option for most of us, your next best choice is to make it harder for cookies, trackers, beacons, and other technologies to follow you around the…

4 Useful Features That Are New in Microsoft Edge

Read time: 45 seconds
Microsoft began a phased rollout of the newest version of its Chromium-based web browser on January 21, 2021. Version 88 of Microsoft Edge offers many enhancements, including four new features that will likely prove useful no matter whether you are using the browser at work or at home. After your Edge browser is updated (it might a take several weeks…

2 Digital Trends to Keep in Mind in 2021

Read time: 90 seconds
By keeping abreast of current trends, business professionals can find out about threats and opportunities that might lie ahead. This information can help them chart the best course forward for their companies.  Here are two digital trends business professionals should keep in mind when they establish their digital strategies and business plans for 2021:  1. The Coronavirus Pandemic Is Changing Customers’…

Cybersecurity for the New Normal

Read time: 30 seconds
It seems likely that some of the changes COVID-19 forced on us have been popular enough to become business as usual – especially a shift toward long-term and even permanent work-from-home policies. But if your organization doesn’t plan to return to the office for many months to come (or at all), you’ve got cybersecurity challenges you didn’t have in pre-pandemic times. And that means…

Seven Steps to Building a Strong Cybersecurity Strategy

If it seems like we’re spending a lot of time talking about cybersecurity lately, you’re not imagining things. Between the need to secure systems so employees can work effectively from home and a massive uptick in cyberattacks, security is at the top of everyone’s agenda, including our own. This step-by-step checklist for building an effective cybersecurity strategy is written for CIOs, but we think it’s useful…

Today is Data Privacy Day

Read time: 20 seconds
Data Privacy Day is Jan. 28, just like it is every year. But as with everything else, COVID-19 has forced us to reconsider a new normal for enforcing data privacy in the work-from-home (WFH) environment. Sponsored by the National Cyber Security Alliance (NCSA), Data Privacy Day is designed to “inspire dialogue and empower individuals and companies to take action” on…

​Share with Care: Manage Privacy Settings

Share with care, what you post can last a lifetime. Update the privacy settings on at least one of your online accounts this Data Privacy Day, January 28.  Want to view your privacy/security settings, but don’t know where to find them? Click here for direct links to update your privacy settings on popular devices and online services.  

Six Steps to Protecting Sensitive Data in the Cloud

Read time: 45 seconds
You understand the importance of protecting sensitive and proprietary data. You’re careful to choose cloud vendors with strong security controls. But is your own use of cloud services giving bad actors an opening to breach your protections?   It sure is. At least according to Gartner, which projects that through 2025, 90% of the organizations that neglect to control their use of public cloud will share sensitive…

Health Care Warning: Beware of Pandemic Phishing Attempts

Read time: 30 seconds
Hospitals and other health care organizations need to tighten up their email security protocols and boost their anti-phishing training to fend off growing cyberattacks that use requests for COVID-19 data to try to penetrate IT systems.  CEOs at several Massachusetts hospitals recently received requests for COVID-19 statistics in emails that appeared to come from US Department of Health and Human Services. However, the emails included external links that…

Preparing for Post-Pandemic IT Needs

Read time: 45 seconds
Now that vaccines are becoming available for COVID-19, there’s a light, however distant at the end of the tunnel. Smart business leaders are already starting to think about how to use technology better now to prepare themselves for the post-pandemic future. These five strategies will help you get a head start:  Leverage automation, AI, and cloud services to take more flexible approaches to work and make your organization…
Menu