One Way to Identify Dangerous Text Message Scams
If you haven’t already, you will receive text messages that entice you to respond. Some of the messages contain links that can infect your phone with spyware and other malicious programs. Before you click a link, follow instructions, or consider believing a text...
Be Sure to Back Up Your Cloud Data
Some organizations move their data to the cloud and stop backing it up. Cloud services offer ways to restore the data. But what happens if an attacker deletes your files and deletes the backup at the cloud service too? Consider backing up your data at a different...
If You Outsource Your IT, it is Their Job to Keep You Happy, Not the Other Way Around.
After we performed a cybersecurity audit for a company many years ago, the President and CEO assigned the recommendations to their IT consulting firm. What is different about this lead executive is that he gently applies firm pressure on their IT consultants to...