IT Security Tip : Don’t Go Phish!

|

  A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular web site or to click and download a virus. Often these e-mails look … Continued

IT Security Tip – use a Strong Pa$$w0Rd!!

|

Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds. You KNOW you need to have a better password than “password” or “letmein” … Continued

How to Foil a Ransomware Attack

|

  Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher). The threat was fairly straightforward: Pay us or we’ll delete all your data. Ransomware, like the … Continued

Hot Pockets – 2015 Q2 Review – The IT Skills Gap

|

Top 3 Reasons Behind IT Skills Shortage We ask decision makers their reasons behind the IT skills shortage. Here are the top 3 responses: We have not invested enough in training to develop the skills We cannot pay what candidates demand It’s difficult to attract candidates to our industry with the skills we need 2015 … Continued