For most people, the first choice for sending files is by using email or sharing links with file storage apps like DropBox, Box or Google Drive or unsecured large file apps, like WeTransfer. Whether you’re sending passwords, contracts, financial documents, or any other confidential information, one believes that their files
Read MorePhishing, a cybercrime in which a target is contacted by email, social media direct message, telephone, or even a text message, is on the rise. Victims, unaware that the criminal is fraudulently posing as a legitimate institution, will often give up their identifiable information, passwords, bank and credit card information
Read MoreThe internet is a great place to connect with people, buy a car, learn something new, and even order dinner delivered to your door. To say it’s made things easier would be a tremendous understatement. We’ve made it a part of our daily lives so much that we depend on
Read MoreThere’s something about email that makes people think it’s secure. They send passwords, social security numbers, and yes, even things like completed direct debit forms with full credit card information ripe for the taking. But why? Probably the only “good” reason is that it’s “easy.” It’s just as simple to
Read MoreWhen it comes to your company’s network security, there are many common vulnerabilities that should be prioritized in order to protect your valuable assets. You can start by asking yourself a few questions about your business’ IT Security, specifically the protection of your data, work product, and productivity software to
Read MoreOne of the the most pervasive myths among small business owners is that the manufacturer and software companies, whose products you are using, are taking care of security for your business. You’ve probably heard the term caveat emptor at some point in your life. It means, “buyer beware” and it
Read MoreDespite the name, Enterprise Security still applies to small and medium sized businesses. Why would a small business invest in that kind of level of security? Simply because smaller businesses often depend on larger clients to keep them afloat, and those larger clients mandate security requirements to be met in
Read More