*This page is a checklist for you to use to secure your mobile device. Anything you check will be saved (for up to 1 year) the next time you visit this page on this same computer. Here are some basic things in more detail that could be done to help secure your phone, but all…

Read More

When a workplace or home evacuation happens, do you have a minimal plan for safekeeping your data? The emergencies that can cause an evacuation can be, but are not limited to: Fire Bomb threat Weather disaster Earthquakes Law enforcement called Broken water pipes Sometimes an evacuation can be used to easily infiltrate a workplace because…

Read More

Updating is of vital importance in figuring out how to stop cyber attacks! It’s important to update all your software on your computer aside from your Operating System software. Over the years, there definitely has been software vulnerabilities that hackers have taken advantage of from some of the most used software, including web browsers, web…

Read More

The least privilege principle can certainly help in preventing a full blown cyber attack. Even just a minimal control like this can prevent the absolute worst from happening. Your log-in to your computer allows you certain privileges on your computer. Your log-in credentials regulate what files you can open and what programs you can install…

Read More

Do you know how to find malicious files once they are on your computer?There is a simple “trick” you can do to find such files. One way that malware proliferates on PC’s is by hiding file extensions. Most computer operating systems (Window’s and Macintosh) hide this by default. A file extension is usually a 3…

Read More

Computer Logon Banners provide a message (usually on the log-in screen) that generally states that a user of said computer system will be held accountable for their actions and consent to things like monitoring. It sets the correct expectations regarding authorized and acceptable use of a computer system and it’s resources, data, and network access…

Read More

Computer login? You might be surprised to know that there are business computers out there that don’t have log-in prompts- anyone is free to use them! One way to help stop would-be criminals from accessing your private data on your PC’s is to simply enable log-in only access. It’s possible (and sometimes default) for all…

Read More

Why two factor authentication? Simply put, it’s very effective against people who try to to break into other’s accounts’ by figuring out or knowing their passwords. This two-step authentication method has helped curb account theft significantly. More than one factor authentication is very important in helping keep your online accounts safe. Single factor authentication is…

Read More

Dumpster diving, in cyber security terms, appears to be possibly an outdated way to go about initially “hacking” into a business. But… One common way for cyber criminals to get sensitive information is to go digging through an individual’s or business’s trash. YES! This does happen! This is a tried and true method called ‘dumpster…

Read More
secure hard drive erase

A secure hard drive erase – an additional piece of mind if your gear get’s stolen! A well equipped cyber criminal can retrieve deleted data with ease as these data retrieval software tools are easy to acquire or even make. Those deleted financial documents you deleted? Most likely still exist on your computer. Those employee…

Read More