If you are a business owner or organization manager, you likely have seen people come and go. New people are hired and others leave – or maybe are let go. When a new person is hired, one of the first things you do is ensure they have an email account and that they have access […]
TIP: You Can’t Take Your Online Accounts With You!
When you pass on, what happens to your online accounts? In some cases, nothing. They continue to exist ad infinitum. However, for some, after a period of inactivity, they will automatically be deleted. So what should you do if you don’t want your online accounts deleted or your online purchases (movies, music, books) lost? Facebook […]
TIP: Public WiFi Saftey
With summer finally here and COVID-19 starting to ease up our quarantine lifestyle, people are traveling more for business and pleasure. Even if you don’t plan to do any work, you will likely take your smartphone or tablet to keep up with Facebook, take photos, or play music. Be sure to take a minute to […]
TIP: Creating strong passwords is the first step to defending against cyber attacks.
Creating strong passwords is the first step to defending against cyber attacks. But often, that means it is hard to remember. The key is to create a strong password that is easy to remember but hard to guess. Here are some tips to help you do that: 1 – Use a phrase that means something […]
TIP: Cyber Security Spring (or any time of year) Cleaning
Spring Cleaning can mean more than just organizing your closet, cleaning the windows in your house and washing the baseboards (throwback to my grandmother’s day). It should also mean cleaning up your devices. Just as you would throw away (or hopefully donate) your old clothes, furniture, or books that you no longer use, you should […]
TIP: Device Updates and Why is Matters NOW!
You may often hear us talk about updating your devices. But do you know why you should do device updates and how? As vulnerabilities are discovered, software developers will push out patches or updates that, when installed, will fix those vulnerabilities (i.e., patch the holes). However, it is up to you, the user, to install […]