Blog
Got New Toys?
Did the holiday season gift you with new tech gadgets? How fun! Upgrading technology is always fun but can also be challenging in...
New Year, New Shield
As we close out this year and enter into 2024 we tend to make resolutions. This is an opportunity to set intentions for...
Cash, Credit, Debit or NFC?
We are spending money almost daily. There are so many methods of payment for our purchases. You may be using a variety of...
Secure Cart: Navigating the Online Shopping Maze Securely
Don't let the Cyber Grinch steal your holidays. Stay vigilant and follow these safe online shopping tips:
- Use...
'Tis the Season
The holiday season is a time of generosity and giving. The Cyber Grinch knows this too and is ready to take advantage of...
A Picture is Worth a Thousand...er...Dollars?
We've heard that a picture is worth a thousand words right? This means that a photo can reveal so much and raise various...
Is MFA Enough?
What is MFA?
Multi-factor authentication provides an extra layer of security when logging into an asset or service. Logins...
Email and Device Use – Blurred Lines
In today’s world, we are all melding our personal and work life responsibilities. Unfortunately, the lines can be blurred in our goal to...
Week 4 Cybersecurity Awareness Month 2023
Update Software.
Keeping your software up-to-date is important. Besides the benefits of added features, these updates may include security patches...
Week 3 Cybersecurity Awareness Month 2023
Recognize and report phishing.
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or...
Week 2 Cybersecurity Awareness Month 2023
Turn on Multifactor Authentication.
MFA can add a layer of security to your login authentication process. MFA authentication requires the...
Week 1 - Cybersecurity Awareness Month 2023
Use strong passwords and a password manager.
This week focuses on passwords. Instead of using common words that are easy to guess it is...
Cybersecurity Awareness Month October 2023
October of 2004 launched the initiative to assist people with efforts to stay safer and more secure online. Since then, the campaign has...
Humans in the Loop
Artificial Intelligence (AI) is gaining ground to assist us in our everyday lives and workplaces. Most are familiar with voice assistants. These devices...
Data Sanitization
Protecting data goes beyond the storage and transfer of information. When you no longer need to keep data how do you ensure the...
Update Your Browser
Security updates are often a very important part of a browser update. An out-of-date web browser can open you to serious security flaws...
TOS - Yeah Fine, I Agree
Wait! What? We all see these Terms of Service that must be agreed to in order to access a service, website or asset....
Cyber Threats to Educational Institutions
Technology is heavily relied on in school settings. Internet connectivity, email, collaboration tools and daily operations all need technology to function. The addition of high tech devices lends itself to productivity but also comes with the potential of cyber threats. What types of threats are targeting our schools, staff and students?
Can We Trust AI?
Artificial Intelligence (AI) is here. The barn door has been opened and the horse is out of the stable. Adopters are discovering the...
Deepfaking: How Bad Actors Are Using It
Deepfakes can be used to persuade, spread disinformation or just be fun. Bad actors are finding ways to use artificial intelligence (AI)...