IT Security Tips

Top 10 Computer Virus Symptoms [Checklist]

Computer virus symptoms are a not cast in stone, but rather a moving target. Just like with the human viral conditions, they evolve through generations – which in computer technology terms may mean weeks or even days. Some symptoms may not necessarily mean an infection – for example, if you are sneezing, you do not …

Top 10 Computer Virus Symptoms [Checklist] Read More »

In time for tax season, IRS launches “Identity Theft Central”

The Internal Revenue Service (IRS) has launched its “Identity Theft Central” webpage to provide 24/7 access to online information regarding tax-related identity theft and data security protection. Tax-related identity theft occurs when someone steals personal information to commit tax fraud. The Cybersecurity and Infrastructure Security Agency (CISA) encourages taxpayers, tax professionals, and businesses to review …

In time for tax season, IRS launches “Identity Theft Central” Read More »

Common Goals and Objectives of a Information Security Risk Assessment

The Internet of Things (IoT) devices are outnumbering the population of our planet. It is projected that the planet will have 20.5 billion devices just two short years away, in 2020. In the next five years the cybercrime is expected to result in business-related economic losses in the astounding amount of $8 trillion – EIGHT TRILLION! Beyond …

Common Goals and Objectives of a Information Security Risk Assessment Read More »

Enjoy the Olympics – But Beware of Online Scams

We are now well underway with the enthusiasm and excitement associated with watching the 2018 Winter Olympics — including the parade of nations, fabulous performances, fireworks, and the intense competitions themselves.  Just a few of the elite USA athletes include favorites Chloe Kim in snowboarding, figure skater Nathan Chen, Mikaela Shiffrin in alpine skiing, and …

Enjoy the Olympics – But Beware of Online Scams Read More »

Why Use a Corporate VPN when connecting to your network

Most corporate IT networks have various security products on the network providing some level of security – a firewall, Antivirus software, backup, etc. Even with these protections in place, without a VPN, employees are only protected while they are on the corporate network. With a VPN installed, employees can enjoy those same protections at all …

Why Use a Corporate VPN when connecting to your network Read More »

Adobe Flash Player Update Scam: what you should know

Adobe Flash Player has unfortunately long been plagued with malware-related issues. The software has often been discovered to have vulnerabilities that make it possible for bad actors to spread malware. The most recent vulnerability was discovered in October of this year. These issues may be part of the reason Flash is being decommissioned in the …

Adobe Flash Player Update Scam: what you should know Read More »

What you need to know about Internet Security Over The Holidays and into 2018

With the continued proliferation of cybercrime in 2017, it appears 2018 will be another year of the “good guys” trying to keep pace with the “bad guys”.  The data breach environment is one of continual change.  It is anticipated that breaches will be bigger and more prevalent, driven by ever-increasing sophistication of hackers and their …

What you need to know about Internet Security Over The Holidays and into 2018 Read More »

Your SMB is a Target For Cyber Crime: Take These 8 Steps to Increase Your Security

When looking for a vulnerability, cybercriminals will go after SMBs and organizations that lack security. An average hacker does not want to pursue the big corporations that have layers of security in place — they want the easy targets. Many SMBs fall victims to cybercrime because they either have “It will never happen to me” mentality, …

Your SMB is a Target For Cyber Crime: Take These 8 Steps to Increase Your Security Read More »