Do you log out of your online banking and close your Browser?
When accessing a banking site online or any other application containing sensitive data, make sure you log out of the site and then close your browser. If you simply close […]
When accessing a banking site online or any other application containing sensitive data, make sure you log out of the site and then close your browser. If you simply close […]
An incident response plan is an organized approach to addressing the aftermath of a security breach, ransomware event or cyber-attack. Certain industries, like medical or financial institutions, require them. But […]
If you handle, process or store credit cards in any manner, you are required to comply with PCI DSS, or Payment Card Industry Data Security Standards. This is a set […]
If you have people who visit your office or home, make sure you have a guest WiFi access for them that is separated from your main WiFi access. If you […]
No matter how diligent you are about security, there’s always a chance you can get fooled into clicking a malicious link or opening an untrusted document. That’s why you need […]
Think fast: what’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince wanting to give you a sum of $34 million? Okay, […]
A secretary unknowingly gave a con artist access to her law firm’s server room when a total stranger showed up in a Comcast Cable shirt and said he was there […]
Here’s a common scam: you get an e-mail from the boss (or your spouse, parents or other trusted person) asking you to send them a copy of employee pay stubs, […]
When doing online banking, don’t access your banking accounts or any of your work accounts from the computers that your kids or general family members use. I understand that when […]
Getting rid of old computers or servers? Did you know that the components used in technology equipment are not landfill-safe? On top of the environmental hazards, unprotected e-waste typically contains […]