Agile Workplace Technology Trends

2. Your Computers – Lock Them Down  Company devices should be locked tighter than your weekend plans. Users should only access machines assigned to them, and only from their usual location. No exceptions. Do you store data locally on your computers? If yes, encrypted it. If you don’t know how, then we need to talk. …

If you can’t tell me who controls your company domain name, you should probably read this

Your company domain name serves as a portal to interact with your clients and advertise your services, and you’ve likely spent the majority of your time promoting your company name and business website/domain name. It’s important to ensure that you have control of your company domain names, so that you can make changes when needed, …

How to prevent the most common cybersecurity breaches

Most of us are aware of the traditional types of invasive attacks, such as computer viruses and malware. But these merely touch the surface. Email phishing attacks, ransomware, crypto-jacking, data breaches, IoT attacks, Denial of Service attacks, and web-based attacks globally cost businesses billions of dollars per year and are on the rise. It is …

Stay Safe from Malicious Online Tools: A Growing Concern

The FBI Denver field office has issued a warning about a rising scam involving free online document converter tools. I thought it best to take the opportunity to reflect upon what this actually means and who is most at risk. These types of online tools were created as an online efficiency; the ability to open …

Beware of Online File Converter Scams: Protect Your Business

The FBI Denver field office has issued a warning about a rising scam involving free online document converter tools. I thought it best to take the opportunity to reflect upon what this actually means and who is most at risk. These types of online tools were created as an online efficiency; the ability to open …