IT Security Tip: Do online banking? READ THIS!

|

If you do online banking, NEVER access your online account with a PC or device that you use to log in to social media sites or free e-mail accounts (like Hotmail) or to surf the web. Since these are all highly hackable, keeping one PC dedicated to online banking reduces your chances of getting a … Continued

IT Security Tip: 3 rules to keeping your data safe in the cloud

|

  If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. So it’s important that you, the … Continued

IT Security Tip: What to do BEFORE you go to Starbucks

|

So you’re in the car or subway on the way home from Starbucks, basking in the glow of consuming your triple-shot, low-foam, extra-hot latte when you suddenly realize your company laptop has gone missing. You drive or run back, only to discover no one has turned it in. What do you do? That depends on what precautions you have (or … Continued

IT Security Tip: If you install it, you must update it!

|

There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in commonly installed software (like Adobe, Flash or QuickTime) to access your computer. That’s why these companies frequently issue patches and updates for KNOWN security bugs; and once a KNOWN vulnerability is announced via a … Continued

IT Security Tip : Don’t Go Phish!

|

  A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular web site or to click and download a virus. Often these e-mails look … Continued

IT Security Tip – use a Strong Pa$$w0Rd!!

|

Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds. You KNOW you need to have a better password than “password” or “letmein” … Continued

How to Foil a Ransomware Attack

|

  Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher). The threat was fairly straightforward: Pay us or we’ll delete all your data. Ransomware, like the … Continued

Hot Pockets – 2015 Q2 Review – The IT Skills Gap

|

Top 3 Reasons Behind IT Skills Shortage We ask decision makers their reasons behind the IT skills shortage. Here are the top 3 responses: We have not invested enough in training to develop the skills We cannot pay what candidates demand It’s difficult to attract candidates to our industry with the skills we need 2015 … Continued