Committing Fraud
Social Engineering is a Crime

Social Engineering Attacks

, ,
Have you or one of your employees received an email or phone call asking for company banking information or fake invoice information? If so, that call could have been a Social Engineering Attack known as phishing. Phishing - A Common Social…

Avoid Security Rule Penalties

, , ,
Most everyone has heard of the Health Insurance Portability and Accountability Acct (HIPAA), but unless your company is in the healthcare industry or is considered a covered business entity, you may not know there are two HIPAA rules – the…

The Value in Virtual Private Networks

,
A Virtual Private Network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Wikipedia If…

Good IT Backup Policies and Practices

,
In our last blog, we talked about backups and why it is essential to do them regularly. Briefly, if your organization has data, it must have the ability to recover, restore, and retrieve that data in the event it is lost. That is why it is important…

Backups are Important

,
Let’s face it – we live in Florida, home of the hurricanes. High winds, pouring rain, and amazing lightning can wreak havoc on the internet, power lines, and yes, your computers. Can you think of any other reasons why backups are important?…

Are Your Systems Up to the Challenge

,
We are all aware of the disruptions Covid-19 has caused. Some companies have had to shut down and furlough their employees. Some organizations were able to keep their business up and running by arranging for their employees to work from home.…
IT INSIGHTS, SECURITY, PASSWORDS

The Importance of 2FA

,
The Importance of 2FA – 2 Factor Authentication Password Policies IT INSIGHTS, SECURITY YOUR DATA MAY BE VULNERABLE TO HACKERS As a small business owner, you rely on the internet for many facets of what makes you successful. Your corporate…