Security best practices for remote workers

Working from home increases employee autonomy, cuts costs, and ensures the health and safety of the company during the coronavirus pandemic. The problem is, it also increases the likelihood of security breaches since employees are working outside the company's security perimeter.

VPN: A quick way to secure remote work connections

A lot of us are suddenly working from home, but few are taking enough safety precautions. Remember, cybercriminals may take advantage of these circumstances to attempt to infiltrate organizations.
So, how can we make sure our sensitive data remains encrypted and secure?

The answer: get a Virtual Private Network (VPN).

VPN is part of a layered security plan and it’s particularly useful for granting remote access safely.

Technology Checklist for SMB’s now Working from Home

You’re home and you’re working. The same goes for your team, and this means everyone.

It won’t last forever (we hope), but it is going to be a little while until we get back to normal.

Your IT department or partner is probably going at 110% right now as they get each person ready to work from home, and they are going to deserve a prize when things settle down.

Read more 1 Comment

Autocomplete password risks

Web browsers come with features to improve user experience. One of the most popular ones is auto-fill passwords. These are designed for users to store and automatically use their account credentials to access websites and other applications. While auto-fill passwords are convenient, they come with security risks.

Make the most of your cybersecurity investment

As cybersecurity incidents become more sophisticated, frequent, and intelligent, experts predict that the global market for cybersecurity products in 2020 will exceed that of last year. In fact, your company might be one of the thousands of businesses looking to purchase cybersecurity software.

Office 365 hacking: What you need to know

With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected.
A phishing scam that harvests users’ credentials
The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials.

Data security: Prevent insider threats

In the healthcare industry, 58% of security incidents begin with an inappropriate action carried out by someone within the affected organization. Although the percentage isn't as high among other industries, it's still something you can't afford to ignore.