by Mike Foster | Apr 2, 2020 | Cyber Security, Cybersecurity, IT Best Practices, Remote Workers, Technology Safety Tips, Zoom
Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings: To help prevent an attacker logging into your Zoom account, enable two-step login. Once activated, then when you...
by Mike Foster | Mar 27, 2020 | Alerts, Best Practices, covid-19, Cyber Fraud, Cyber Security, Cyber Security Training, Executive Tips, IT Best Practices, Password Safety, Technology Safety Tips
Warn your users about three ways attackers continue to exploit the COVID-19 crisis: USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in, they can open up a channel that permits unauthorized remote control...
by Mike Foster | Mar 20, 2020 | IT Best Practices, Remote Worker, Slow Internet, VPN
Prepare now for slow Internet speeds and dropped mobile phone calls. Some customers report that their remote workers experience slow Internet speeds. The sheer number of people working from home, and others watching videos at home, is causing the Internet to...
by Mike Foster | Mar 18, 2020 | Alerts, Best Practices, Coronavirus, Cyber Security, Cybersecurity, Decoy Website, IT Best Practices
Alert your workers to be on guard looking for fake, decoy websites about coronavirus, even closings, and related alerts. Attackers design the content to be frightening or otherwise enticing so users click without thinking. Warn them that there are hundreds of new...
by Mike Foster | Mar 9, 2020 | Coronavirus, Cybersecurity, IT Best Practices, Technology Safety Tips, Uncategorized
The rapidly changing situation of potential school closures, self-quarantines, and public reaction to the coronavirus guarantees that at some point you will have employees who need to work from home. If the employee’s computer isn’t secure, your organization’s...