Security Best Practices

Too many small businesses fail to implement basic security measures. This lack of security makes them vulnerable to lost data, lost productivity, and legal liability issues. The following is a list of basic Best Practices every small business needs to create a Secure Computing Environment. This list is common to most small businesses but security […]

Read More

Posted in News developer May 25, 2019

Phishing and Spear Phishing Email Scams

Phishing and Spear Phishing are becoming more common and more dangerous. It’s critical that all of your employees be aware of it and know how to spot it. What is Phishing and Spear Phishing? Phishing is any attempt to trick you into providing info or doing something. Most typically this involves sending an email (or […]

Read More

Posted in News developer January 15, 2019

Security 101 – Two-Factor Authentication

Two-Factor Authentication (2FA) improves security by adding an extra step to the login process. One thing has become clear over the last few years: Passwords are not enough to provide good security for sensitive data. Hacking tools, phishing scams, and poor password discipline by users have exposed the weakness of “password only” login systems. According […]

Read More

Posted in News developer May 12, 2017

Security 101 – Password Policies

Passwords are the underlying prerequisite for almost all security solutions. Even the best firewall or VPN is useless if someone can get your passwords and study after study has shown that the vast majority of security breaches come from poor password management. When you start thinking about security, start by creating a solid Password Policy […]

Read More

Posted in News developer February 17, 2017

Security 101 – Local User Accounts

Properly managing Local User Accounts is critical for both security and recovering a malfunctioning computer. Unfortunately many people aren’t even aware they exist and even fewer know what they should do with them. Lets start by understanding what Local User Accounts are: User Accounts: Most people are aware that they have to “login” when they […]

Read More

Posted in News developer October 22, 2015

Security 101 – Local Admin Rights

Should you give Local Admin Rights to the user that will login to a computer? This is one of the major decisions that must be made when configuring a computer. As with all security decisions it comes down to a trade-off between three issues: Increased Security, Ease of Use, and Cost. Local Admin Rights: Giving […]

Read More

Posted in News developer October 22, 2015