IT Security Tip #22: Use extreme caution when using PERSONAL devices to connect to COMPANY data

Quick Tip: Check before you use personal devices to access company data.

You’re a hard worker who likes to check email and get a few things done after hours--all good! But here’s something you might not know: you should never access company data, file servers or applications through personal devices and home PCs that are not properly monitored and maintained.

IT Security Tip #21: Don’t download ANYTHING you’re not authorized to download

Quick Tip: Check before you download.

Why?  So you have a big file you need to get over to your printer YESTERDAY and you can’t get it to “send” via email because the file is too big. What should you do? The right thing to do is contact your IT department (us!) so we can assist by installing a secure, commercial-grade file-sharing application.

4 Social engineering scams to watch out for

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information.

5 simple but manageable security measures

Don’t be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that’s often far too complicated to operate without their help.

IT Security Tip #20: How to keep your team from unintentionally causing a security breach

Quick Tip: Make security a habit, through Security Awareness Training and Testing.

Why? With so many access points, from cell phones to laptop and home computers, how can anyone hope to keep their network safe from hackers, viruses and other unintentional security breaches? The answer is not “one thing” but a series of things you have to implement and constantly be vigilant about, such as installing and constantly updating your firewall, antivirus, spam-filtering software and backups.

TMI…When Sharing Word Documents

Do you realize that your Microsoft Word document may contain hidden and personal information that you may not want to share with others?  Confidential information is stored in the document properties or document itself (e.g., comments from reviewers, revision marks from tracked changes, details about the author, date when a document was created, headers, footers and hidden text).

When sharing electronic copies of Microsoft Word documents, it is a good idea to remove this metadata before sharing with others.