- Home
- protect
Latest Posts
Executives tell Employees – It is OK to lose your phone
These days, employees’ phones contain your company’s sensitive data. Sure, IT can wipe the data off of the phone remotely, but ONLY when the employee notifies someone that they lost their phone. What happens is the users do not notify IT, and the lost phone still contains the sensitive data. To solve this problem…
Continue reading Executives tell Employees – It is OK to lose your phoneAre you rolling out the welcome mat to attackers?
One of the biggest surprises IT receives during an audit is that their network is basically configured to grant attackers access.
Continue reading Are you rolling out the welcome mat to attackers?Be sure to enable device tracking on your mobile devices
Someone stole my iPad. In November I realized my iPad was suddenly missing. Apple’s Find My iPhone showed the device to be in a parking lot just outside of a transportation company’s main office —I used the transportation service late the night before.
Continue reading Be sure to enable device tracking on your mobile devicesA surprising way employees steal from you
Our CSI and physical security auditor knows that one of the most common ways employees steal from businesses is to throw something valuable in the trash.
Continue reading A surprising way employees steal from youThe importance of physical security audits
In addition to IT security audits, many organizations are also required to perform physical security audits as well.
Continue reading The importance of physical security auditsShould you block your employees from accessing social media?
In the past, I’ve been known to instruct companies to block all employees from social media. Times are changing.
Continue reading Should you block your employees from accessing social media?For traveling users, wireless 3G is better than hotels
From the standpoints of speed, cost, and security, you may find that providing a Sprint, AT&T, Verizon, or T-Mobile wireless connection will be much better than using hotel provided Internet services.
Continue reading For traveling users, wireless 3G is better than hotelsA data backup strategy for your company
Backup problems continue to plague businesses. One of the biggest problems happens when you attempt to restore and find out your backup is no good. For the past few years, business continuity devices have emerged to ease the pain of backups.
Continue reading A data backup strategy for your companyFollow these 7 steps when you buy a new computer
* Read the updated version of this blog post. Executives often want to know what steps to take when they purchase a new computer.
Continue reading Follow these 7 steps when you buy a new computerCan you trust your IT professional’s answer?
I had the pleasure of performing an audit at a company recently where the lead IT professional was shocked to learn that his e-commerce system needed to be secure in order to keep credit card information secure as part of PCI-DSS compliance.
Continue reading Can you trust your IT professional’s answer?Recent Blog Posts
- Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems
- Essential Equipment for Work From Home Users During Power Outages
- Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers
- A Simple Way to Protect Work From Home Users and Families
- Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Attachments
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Blacklist
- Bromium
- browser security
- Business Email Compromise
- Carbon Copy Cloner
- CCleaner
- CCPA
- Children
- Clean Browsing
- Cloud
- Computer Processor
- Computer Security Day
- Coronavirus
- covid-19
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Fraud
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- Decoy Website
- DEF CON
- Disabling Macros
- Disaster Plans
- Disaster Recovery
- DNS
- Download
- Email Security
- Encrypted Attachments
- Equifax
- Eternal Blue
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firewall
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacked Email
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- Infection Vector
- Inpivx
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Risk Management
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malicious Advertising
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- Norton ConnectSafe
- NSA
- NYC Secure
- Online Impersonators
- Online Meetings
- Online Security
- Open DNS
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Protection Tools
- Pwn2Own
- Quad9
- Ransomware
- Remote Worker
- Remote Worker Security
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- RSA Security Conference
- Save time
- Scratch
- Security Breach
- Security Logs
- Service Provider Breach
- Service Provider Safety
- Shadow Protect Desktop
- Sir Michael Fallon
- Slow Internet
- social media
- SolarWinds
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Tech Support
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uncategorized
- Uninstall
- Upgrade
- Video Meeting Security
- Videos
- VirtusTotal.com
- Virus
- VPN
- WDAG
- Web Content Filtering
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows
- Windows 10
- Windows 7
- Windows Update
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo
- Zoom