Blog
The Verizon 2019 Data Breach Investigations Report
The Verizon 2019 Data Breach Investigations Report (DBIR) has been released. This report is built on the analysis of over 41,000 security incidents and...
Hacked!
Hackers have devious ways of infiltrating your system and stealing your data. Crooks aren’t always after the biggest fish in the sea but instead rely...
Combine Assessments and Pay Only One Travel Fee
Combine Assessments and Pay Only One Travel Fee
Summer is a great time to assess your technology infrastructure and make...
Protecting Personal Data
One big risk of identity theft is that a crook might take out loans or open credit cards in your name and then never pay...
Cyber Law
Cyber law applies to Internet and Internet related technologies. Cyber crime can target individuals, businesses, property and government. It can include harassment, stalking, identity theft,...
If It's on the Internet
If it’s on the Internet it must be… …True …Free …Safe …Cheaper True? If you think about it, we all have the ability to ‘break the news’ of the latest...
MFA vs. 2FA
Multi-Factor Authentication (MFA) vs Two-Factor Authentication (2FA) In an effort to make password authentication more secure it is necessary to implement technology to strengthen the process. Simply...
Gas Pump (and Other) Card Skimmers
Before you put your debit or credit card into the machine take a closer look. Crooks have been known to place card skimmers on...
Zoom
Zoom mobile videoconferencing enables you to quickly and easily remote one student or a classroom of students into a class lecture or a distance learning plan.
Exploits, Malware and Botnets
As outlined in Fortinet’s Q4 Threat Report the focus is on these 3 trends: exploits, malware, and botnets. Highlights of the report:
- 6 out...
Investing in Cybersecurity Defenses
How can you justify a cybersecurity budget? How do you know where to best invest your money so that you get the most bang for...
How Malware Works
Malware: software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Types of Malware (click on each for Wikipedia/Webopedia definition)
-
...
What You Should Know About Beacons
Beacons are small, wireless transmitters that use low-energy Bluetooth technology to send signals to other smart devices nearby. WordStream.com Offices and personal spaces are becoming more...
Security is Cumulative
Security is cumulative. The threat landscape is always changing. As technology evolves there are new attacks in which we must defend against. But that does...
Gaggle Safety Management
Gaggle helps ensure the safety of students by combining machine learning technology with real people who review questionable or suspicious content in email,...
NetworkScout
We have partnered with Secure Ideas who will offer a consortium discount on NetworkScout to our members.
Secure Ideas’ NetworkScout...
StormWind Online Training
StormWind offers training in both a live online format and an on-demand format.
SMART Learning Suite Discount
Aggressive discount on the collection of software used with SMART Boards and interactive panels.