by James Healy | Sep 15, 2021 | Business Stories, Cybersecurity, I.T. Tips, Phishing, Podcast
16. Having A Great Relationship With Our Customers Is Key September 15, 2021 I can’t remember any meeting I’ve ever sat in with a potential client who asks us about our certifications. Most of our clients don’t even know what those certifications...
by James Healy | Sep 8, 2021 | Business Stories, Cybersecurity, I.T. Tips, Phishing, Podcast
15. Multifactor Authentication Could Save Your Bacon September 8, 2021 Two-factor authentication or multifactor authentication is making a huge push over the past couple of years, but it’s been around for a while. The reason it’s making such a big push...
by James Healy | Aug 31, 2021 | Business Stories, Cybersecurity, I.T. Tips, Phishing, Podcast
14. Do Your Laptops Have Encryption Enabled? They Should! August 31, 2021 Your phone and tablets, those are a little easier to secure in that most people either have a pass code or face ID or fingerprint identification. That’s pretty secure. That’s about...
by James Healy | Aug 24, 2021 | Business Stories, Cybersecurity, I.T. Tips, Phishing, Podcast
13. Password Best Practices for Ultimate Security from Hackers August 24, 2021 When it comes to passwords, there’s some pretty hard and fast rules on what you should and shouldn’t use as far as length of password and types of characters. What I like to...
by James Healy | Aug 17, 2021 | Business Stories, Cybersecurity, I.T. Tips, Phishing, Podcast
12. Are You Updating Your Hardware and Firmware? You Should Be! August 17, 2021 The hardware you use your for businesses, a router and a firewall, switches, wireless equipment, all of this, even though it’s hardware it also requires updating to keep security....
by James Healy | Aug 10, 2021 | Business Stories, Cybersecurity, I.T. Tips, Phishing, Podcast
11. How to Back Up Your Server and Computer System (You Do Have a Backup, Right?) August 10, 2021 When it comes to backups, there are many methods out there, all at different price levels. We typically cloud our clients typically employ one of three methods. The first...