by Mike Foster | Oct 23, 2019 | Alerts, Best Practices, Cyber Security, Technology Safety Tips, Uncategorized
When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it. However, if you receive a Word, Excel, or another file type other than a pdf, beware. In the past several days, two of our...
by Mike Foster | Sep 5, 2019 | Best Practices, Cybersecurity, Executives and IT, IT Best Practices, Preventative IT Mainenance, Preventative IT Security Breach, Technology Safety Tips, Windows, Windows 7
Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network. Security patches are one of...
by Mike Foster | Jul 24, 2019 | Credit Freeze, Cyber Scams, Cyber Security
There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American’s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove...
by Mike Foster | Jul 3, 2019 | Best Practices, IT Best Practices, Tech Support
A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the...