Blog

Categories
Blog Data Backups & Recovery

Lose something? That’s why you have a backup.

Data Backup and Recovery is an important topic because, well, people lose things. Humans delete files by accident. Servers fail. Storms damage offices. All we can do is create a plan to recover quickly and get back to business. Read on about what losses you should consider. And check out this visual snapshot to help review data backup needs with your team.

Categories
Blog Data Backups & Recovery

Don’t spring clean your data yet (check your backups)

April is all about spring cleaning. It’s the time of year when we want to clear out clutter and make room for new ideas and fresh starts. That includes deleting old folders or files you don’t need anymore… until later on when you realize you need those files. Now what?

Categories
Employee-friendly Content Cybersecurity - Prevention Blog

Security Awareness Training: Don’t let an employee ruin your day

You’ve set up your organization’s cybersecurity—considering firewall, anti-virus, DNS and web filtering, your wireless network… and on and on. You’ve made all the difficult IT security decisions to protect your business, but just one well-meaning employee that clicks one malicious link in one little email can open the door for a hacker to defeat all your defenses.

Categories
Employee-friendly Content Cybersecurity - Prevention Blog

Pssst: Our Password Protocol Advice

Let’s start by clearing the air: It’s normal to have a love-hate relationship with passwords. It’s hard not to love the very things that keep your information safe, ensure private conversations are kept private, and give you peace of mind to go about your business.

Categories
Cybersecurity - Prevention Cybersecurity - Detection and Response Blog

Wi-Fi Network Security: Take Another Look

We’re all accustomed to hopping on wireless networks whenever we can—saving data use on our mobile devices. And we appreciate when the office or coffee shop or school makes it easy for us to connect any time we visit. For most organizations, offering guest Wi-Fi access is a must. But is having a simple password enough to keep company data safe?

Categories
Security Alerts Cybersecurity - Detection and Response Blog

Patching the Spectre & Meltdown security vulnerabilities

You may have heard about the Spectre and Meltdown security vulnerabilities recently. While there’s no evidence of anyone exploiting the security flaw, we want to make sure our clients are aware of how it’s being resolved.

Categories
Cybersecurity - Prevention Cybersecurity - Detection and Response Blog

A compilation of cybersecurity predictions for 2018

Forbes just released a compilation of 60 cybersecurity predictions for 2018. While no one can predict the future, we’re sure that cybersecurity is going to stay in the headlines and at the top of our list. We’ve curated the predictions most likely to interest or impact our clients’ organizations here:

Categories
Cybersecurity - Detection and Response Blog

Cyberattacks target schools, too.

NBC News recently shared this report about schools in Columbia Falls, Montana that were targets of a cyberattack. Hackers accessed students personal data—social security numbers, phone numbers—and threatened to release that data and hurt children unless a ransom was paid. The hackers also accessed school security cameras and could watch everything going on. This school district lies in a quiet town at the foot of Glacier National Park, showing that threats can affect any organization, anywhere.

Categories
Employee-friendly Content Productivity Blog

How to set “Active Hours” so Windows Updates don’t interrupt you

Get ready for a big update from Microsoft for Windows 10

Categories
Employee-friendly Content Cybersecurity - Prevention Blog

Hey, I found a USB stick.

A good reminder from our partner, KnowBe4, on USB sticks (aka thumb drives). We’ve stopped giving out branded USB sticks at events to make sure we don’t encourage folks to plug in an unknown drive. If you find one, be sure to give it to an IT professional (like your friendly WorkSmart consultant) so he or she can test it safely off the network.