Whether you like it or not, you have an online persona. When you apply for a job or school, or when you meet someone new, it’s very likely that you will be “Googled” before you have the chance to make a traditional first impression. These days, the first impression is what people learn about you […]
Nine Tips for Mobile Device Safety
Most of us these days rely more on our mobile devices than on our computers. And most mobile devices hold just as much sensitive information. Take steps to protect your mobile device. Keep your device locked when you aren’t using it Always use the access protection on your device whether it is a PIN, a […]
Avoid Wreaking Havoc on your Organization with a Cyber Security Consultant
Many organizations believe that having anti-virus software is enough to protect their systems. As cyber crime has become more sophisticated, our defenses must as well. So instead of just installing anti-virus to prevent a cyber attack (which is only 40% effective), how can you protect your organization? An effective cyber security approach is no longer […]
REVIEW: Level Up: The Ultimate MSP Roadmap For Security, Operations, and Profitability
Full disclosure, Bruce McCully is a friend and colleague. I first met Bruce when I worked for a small start-up tech company. His company, Dynamic Edge, did the programming for our product. His attention to detail, intelligence, dedication to working with the client, and delivering a world-class product – not to mention his affable nature […]
Exclusive Cyber Tips for the NON-Tech Manager
Whether you are a business owner, manager or elected leader, cyber security is now part of your portfolio of things that keep you up at night. If not, WAKE UP! Because it should. Here are some high-level tips that will help you protect your organization from cyber attack: 1 – Phishing Training – While you […]
Behind the scenes peek at why a Cyber Security Assessment is critical
There are several reasons why an organization would have a cyber security assessment done. First, even the best cyber security program should be evaluated to see if there are any gaps. A third-party assessment can identify those gaps and if/where there are any open ports through which a cyber criminal can access your system before […]