Security

Travel and Tech: What You Need to Know About _FreeAirportWiFi

Maybe you hate the airport, or maybe you love it so much you could watch Spielberg’s THE TERMINAL in the Korean Airlines LAX Lounge and unironically think “hashtag life goals.” (Guilty.) Whatever your feelings are, once you make your way through the living nightmare that is TSA, lollygag in duty free for an hour looking

2019-09-09T18:21:56+00:00September 9th, 2019|Security|

The Risk Tax of Cybersecurity Breaches: Is It Something You’ve Accounted For?

“Did you ever grow anything in the garden of your mind?” It's been many decades since the beloved Mr. Rogers posed that question, and many decades since we each left childhood behind. We got older, we went to college, and a few of us — perhaps you? — found growth in one particular idea:  we

2019-07-23T18:18:24+00:00July 23rd, 2019|Security|

Information Security Compliance, Part 1: Do you know which regulations apply to you?

Information security is one of the biggest challenges facing our society today:  How do I protect my personal data? How much information should I give away? Just this week, Experian announced a new program that would provide consumers who opt in a modest boost to their credit score — a potential boon to those with

2019-03-04T19:33:10+00:00February 21st, 2019|Security|

Offboarding an Employee: What Happens When Someone Leaves Your Company?

Whether they’re leaving on good terms or involuntarily, an employee departure is always a precarious time for a company. The exit of someone who was once deeply involved in the day-to-day operations of your business can present a very real threat to your cybersecurity, but by developing a thorough IT offboarding policy and rigorously following

2019-03-04T19:19:47+00:00October 29th, 2018|General IT, Security|

IT Policy: How Often Should You Change Your Passwords?

Anyone who’s ever created a login has no doubt bumped up against seemingly arbitrary and annoyingly complex password composition rules. For digital citizens, one of the most frustrating hoops to jump through is the forced inclusion of special characters. But wait, not THAT special character… or that one… or that one… or that-- okay, a

2019-03-04T19:18:50+00:00October 19th, 2018|Security|

The Truth About Spam

We’re not referring to the delicious potted meat you’ve grown to love (or hate), though it’s certainly named for its ubiquity. Spam in its most loathsome form — the unsolicited, commercial email sent indiscriminately and in bulk, rarely for non-nefarious purposes — is serious business. On the Seriousness of Spam Anyone who gets spam a

2019-03-04T18:59:13+00:00September 21st, 2018|Articles, Security|

Does your company have a “Shadow IT” department?

“Shadow IT” can be defined as IT solutions deployed within a business without the knowledge or approval of the IT department. It is put into place by employees who are looking for ways to be more productive and find going through the proper channels to get IT services approved to be cumbersome and time consuming. Employees

2019-03-04T18:31:58+00:00July 10th, 2018|Security|

“F” Is For Phishing: How To Identify The Fake, False, Fraudulent Emails Already In Your Inbox

It’s 2 AM, and you’re sound asleep. A sudden DING slaps you awake. In a sleepy haze, like a moth to a flame, you fumble for the glowing screen. A new notification floods your bedroom with light:  an email from your boss. That’s odd, she’s never awake at this hour. Your finger hovers over the

2018-06-22T23:11:12+00:00June 25th, 2018|Security|

Website Security: SSL and making your website safe for your customers

How safe is your company’s website? If the URL starts with the letters HTTPS, that is a good start. But there is another important element your website needs to ensure it is safe for your visitors and customers. Please read on for important reasons why you need the right SSL certificate and what that means

2018-06-13T17:20:48+00:00June 12th, 2018|Security|