by Mike Foster | Feb 17, 2022 | Cybersecurity, Family Security, Password Security
People sometimes lose or misplace USB memory sticks, SD Cards, External USB hard drives, and other external storage media. Help protect your data from prying eyes and cyber thieves by encrypting the drive. On Macs and Windows, encrypting an external drive can be as...
by Mike Foster | Feb 4, 2022 | Cybersecurity, Cybersecurity Audits, Email Security, Hacking
This week, two companies contacted us asking how they can block bad actors from sending fraudulent email messages pretending to be from their company. There are underutilized email settings that can:-Prevent bad actors from sending email messages impersonating your...
by Mike Foster | Jan 27, 2022 | Cybersecurity, Cybersecurity Audits, Hacking
Before you let passwords and two-step login be the security controls you rely on the most, remember bad actors can altogether bypass the login if they take control of users’ computers. Think of buildings that have locked doors. If an employee lets a stranger...
by Mike Foster | Jan 20, 2022 | Mobile Security, Password Security, Supporting IT Professionals
Sometimes, when you log in, you must enter a code you receive by text or from an app on your phone. However, if you use one-tap login, all you need to do is click a checkmark on your phone’s screen. Some organizations, including Microsoft, give you the option to...