- Home
- IT Pro Tips
Latest Posts
Executives Appreciate it when IT Professionals Communicate Effectively
Today, an IT Guru called to gather more information as he prepared to meet with his executives. His methodology was impressive, and executives might want to forward this to your IT professionals. IT professionals want to do a great job of communicating with executives and they welcome guidance for communication. A while ago, the executives […]
Continue reading Executives Appreciate it when IT Professionals Communicate EffectivelyThe Insanity of Your Network – Storing Keys in the Same Place as Everyone Else
Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team
Continue reading The Insanity of Your Network – Storing Keys in the Same Place as Everyone ElseA New Opportunity for Your IT Pros to Protect your Servers
Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money.
Continue reading A New Opportunity for Your IT Pros to Protect your ServersHow Buying a Spare Printer can Vastly Improve Your Cyber Security
Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What problem will the IT professional address first?
Continue reading How Buying a Spare Printer can Vastly Improve Your Cyber SecurityIT Professionals: 3 Things IT Professionals Must Do to Avoid Being Fired
To keep their job, IT Professionals must do three things.
Continue reading IT Professionals: 3 Things IT Professionals Must Do to Avoid Being FiredA Way to Control Consultant Access – Every Time
What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt?
Continue reading A Way to Control Consultant Access – Every TimeHow To Know if a Password Attack Succeeded
Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack…
Continue reading How To Know if a Password Attack SucceededAre You Paying IT Pros Too Much?
Are You Paying IT Pros Too Much? IT Professionals have approached me to say they feel unhappy with their compensation. And some executives ask how much is enough pay. There are ways to know…
Continue reading Are You Paying IT Pros Too Much?Your IT Pros Deserve This
Give your IT Professionals an edge, and show your appreciation of them at the same time.
Continue reading Your IT Pros Deserve ThisHuge Change in Scheduled Patches
IT Pros know to clear their calendars right after the second Tuesday of the month. Dubbed “Patch Tuesday,” that’s when Microsoft releases most patches. Microsoft announced they are abandoning that practice and will release patches ASAP when they are available. What it means for your IT Pros…
Continue reading Huge Change in Scheduled PatchesRecent Blog Posts
- A Simple Way to Protect Work From Home Users and Families
- Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks
- Three of the Most Useful Links About the SolarWinds Attack:
- The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.
- Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Attachments
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Blacklist
- Bromium
- browser security
- Business Email Compromise
- Carbon Copy Cloner
- CCleaner
- CCPA
- Children
- Clean Browsing
- Cloud
- Computer Processor
- Computer Security Day
- Coronavirus
- covid-19
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Fraud
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- Decoy Website
- DEF CON
- Disabling Macros
- Disaster Plans
- Disaster Recovery
- DNS
- Download
- Email Security
- Encrypted Attachments
- Equifax
- Eternal Blue
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firewall
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacked Email
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- Infection Vector
- Inpivx
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Risk Management
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malicious Advertising
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- Norton ConnectSafe
- NSA
- NYC Secure
- Online Impersonators
- Online Meetings
- Online Security
- Open DNS
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Protection Tools
- Pwn2Own
- Quad9
- Ransomware
- Remote Worker
- Remote Worker Security
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- RSA Security Conference
- Save time
- Scratch
- Security Breach
- Security Logs
- Service Provider Breach
- Service Provider Safety
- Shadow Protect Desktop
- Sir Michael Fallon
- Slow Internet
- social media
- SolarWinds
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Tech Support
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uncategorized
- Uninstall
- Upgrade
- Video Meeting Security
- Videos
- VirtusTotal.com
- Virus
- VPN
- WDAG
- Web Content Filtering
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows
- Windows 10
- Windows 7
- Windows Update
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo
- Zoom