Insight From Innovation
In this issue:
- Working Remotely: Necessity Was the Mother of Invention
- Taking a Look at Cloud Challenges
- Top 3 Things that Need MFA
- Transform: PC to TV
- See the World Through New Lenses
Insight From Innovation
In this issue:
Many people use auto-fill passwords for their convenience. What you might not know is that hackers and advertisers can use them to get access to websites and other applications and gather sensitive information. Learn more about the risks of using autocomplete passwords.
It’s not always easy to see all the things your IT company is doing for you. When everything is going smoothly and you are not experiencing any computer issues at all, you might assume your IT company isn’t really doing anything for you. Nothing could be further from the truth.
Dark Web monitoring is a service that provides you with vision into sensitive data that might be lurking around on the web. The “Dark Web” is an unofficial network of information that contains a variety of personal information and security credentials that are then resold to cyber criminals.
Nothing on the internet is private. Communications, pictures, videos—they’re all susceptible to prying eyes and have the potential to be misused. Here are the biggest privacy threats you face online today:
Webcam Access – While it’s rare, there are known exploits that allow others to access your webcam (such as malicious software or software security flaws). Putting a Post-it note over your webcam isn’t a bad idea.
Quick Tip: Make your email password different than all others.
Why: You know you’re guilty of it: using the same password for everything. Believe me, I understand how annoying it is to try and remember all those passwords. If you’re using the same password for sites that don’t share sensitive information, like a login to a news feed you like to read, then it’s generally okay.
What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who executes a vulnerability test and presents their findings to software vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is […]
Insight to Vision 2020
In this issue:
Quick Tip: Check before you use personal devices to access company data.
You’re a hard worker who likes to check email and get a few things done after hours--all good! But here’s something you might not know: you should never access company data, file servers or applications through personal devices and home PCs that are not properly monitored and maintained.
Your business’ IT environment is a lot like the body’s skeletal system. It’s the conductor that orchestrates the flow of your day-to-day operations, allowing you to provide valuable services to your clientele. When your IT skeleton, or foundation, is strong and healthy, it supports all of the processes you rely on and you don’t even realize it’s there.