Archive by Author


Keep your identity safe with Two-Factor Authentication

This post is part 4 of 4 in the series Cyber Security Basics

Cyber security is sounding more and more like a buzzword these days. You hear about it on the nightly news, from your politicians, and even your neighbor. But it’s never been more important. While we don’t want to instill any fear into your mind, we do want you to be armed for success in case […]


3 Steps to Prevent Malware Attacks like WannaCry

This post is part 3 of 4 in the series Cyber Security Basics

Most have heard that a potent malware threat has been recently discovered, called “WannaCry.” This type of malware is of the “CryptoLocker” variety — a virus that encrypts the files on your computer, and holds them as ransom (preventing you from accessing them) until you pay for a password to decrypt them. This specific malware […]


Prevent Identity Theft with a More Secure Password

This post is part 2 of 4 in the series Cyber Security Basics

Your password is your first line of defense in securing your online presence. With the rise of identity theft and email hacking, your basic passwords no longer make the cut. Having a secure password will prevent attempts to compromise your accounts. Creating a secure password Experts suggest using a password that is at least 8 […]

Phishing Attack

3 Tips to Arm Yourself From Phishing Scams

This post is part 1 of 4 in the series Cyber Security Basics

Phishing is one of the most dangerous and compromising scams on the Internet. “Phishing” refers to an attempt to acquire sensitive information such as your login credentials or passwords by pretending to be a trustworthy source such as your bank or email provider. The anatomy of a phishing email is simple: a service you may […]

Working Remote Checklist

Working Remotely: Your Documentation and Testing Checklist

This post is part 5 of 5 in the series Working Remotely

Editor’s Note: Check out our five-part Working Remotely series to obtain tips and learn best practices to help you make sure your business operates at peak performance, whether employees are in the office or not. You can review the previously posted articles including employee laptops, moving your company to the Cloud, setting up a VPN […]