Distributed spam distraction hides illegal activities

As annoying as spam email is, it’s usually pretty harmless. But hackers have been using a method called distributed spam distraction (DSD) where spam email is used to carry out illegal activities. Learn more about DSD and how you can safeguard your systems against it.

Your password may not be secure — update it now

The National Institute of Standards and Technology (NIST) once said that a good password consisted of three things: upper- and lowercase letter, numbers, and symbols. However, the NIST recently reversed its stance on good passwords. Here’s why and what they are now recommending.

Work computers and devices are only for ONE thing…

Quick Tip: Separate work and personal accounts/devices as much as possible.

Why: If you’re using a company device to access a compromised account, you’re opening up a door to a hacker who can then get into your company’s network via your email or PC. Bottom line, don’t use company PCs, devices, phones or internet for PERSONAL use.

The Good, the Bad and the Ugly of Technology During the COVID-19 Pandemic

As almost every organization has undergone dramatic changes in their Information Technology (IT) framework over the past few months, we noticed a lot of things:  Some good, some bad and some are downright ugly.  You need to know about all three:

The Good

By far the best of the good has been how so many organizations have enabled a remote workforce in a secure fashion.

Don’t download ANYTHING you’re not authorized to download

Quick Tip: Check before you download.

Why: So you have a big file you need to get over to your printer YESTERDAY and you can’t get it to “send” via email because the file is too big. What should you do? The right thing to do is contact your IT department (us!) so we can assist by installing a secure, commercial-grade file-sharing application.

Spying from Afar

Employee Monitoring is Sometimes Necessary
On occasion, we are asked to assist in monitoring an employee’s computer usage. We always advise that this type of monitoring should not be done without a person’s permission. In fact, we encourage our clients to have and maintain IT policies that clearly document what is and what is not permitted on a company-owned computer and network before any issues occur.