With kids heading back to school, it’s an excellent time to review safety tips for children. Kids are especially vulnerable. They are more trusting and want the validation of adults and their peers. They also face plenty of online threats, everything from cyberbullying and sexting to phishing attempts and the theft of their laptops and […]
REVIEW: Protecting Your Internet Identity: Are You Naked Online?
Whether you like it or not, you have an online persona. When you apply for a job or school or when you meet someone new, you will likely be “Googled” before you have the chance to make a traditional first impression. “Protecting Your Internet Identity” is an excellent way to help make a first impression […]
Nine Tips for Mobile Device Safety and Security
Nowadays, most people rely more on their mobile devices than on their computers. And most mobile devices hold just as much sensitive information. Take steps to ensure your mobile device safety. At Commonwealth Sentinel, we can evaluate your existing IT security and work with your team to improve it. We can also provide a complete […]
Avoid Wreaking Havoc on your Organization with a Cyber Security Consultant
Many organizations believe that having anti-virus software is enough to protect their systems. However, as cyber crime has become more sophisticated, our defenses must also evolve. Hiring a Cyber Security Consultant is a great first step to a secure future. So, instead of just installing anti-virus software to prevent a cyber attack (which is only […]
Exclusive Cyber Security Tips for the NON-Tech Manager
Whether you are a business owner, manager, or elected leader, cyber security is now part of your portfolio of things that keep you up at night. If not, WAKE UP! Because it should. Here are some high-level tips for a NON-Tech Manager to help protect your organization from cyber attacks: At Commonwealth Sentinel, we can […]
Cyber Security Assessment -Behind the scenes peek at why it’s critical for your organization
There are several critical reasons an organization should conduct a cyber security assessment. First, even the best cyber security program should be evaluated to see if there are any gaps. A third-party cyber security assessment can identify those gaps and if/where there are any open ports through which a cyber criminal can access your system […]