Please ensure Javascript is enabled for purposes of website accessibility

Reshaping The Security Landscape.

Reshaping The Security Landscape.

Network Week in Review: COVID-19: Reshaping the Security Landscape.

Remote work has become the new normal and we all are still adjusting. While there remains uncertainty around how our future with COVID-19 will unfold, an ounce of prevention is worth a pound of cure.

This week we heard about hackers utilizing Google analytics to bypass web security and steal credit cards from infected e-commerce sites. In addition, your stolen, or lost, and the data is not backed up, you just lost it all. If you have a password on your laptop, it will slow the thief down; but what it doesn’t stop is someone removing the hard drive and connecting it to another computer to get access to all your files, passwords and e-mail –that’s not hard to do.…

read more

Change. The new normal.

Network Week in Review: Change. The new normal. 

Recently we’ve all faced changes to our personal and professional lives and the normal refers to constant change. Our current epidemic has brought very believable COVID-19 phishing scams. Especially the targeted spear phishing, which reveals  how cyber criminals exploit Dark Web information and the online buzz for profit.…

read more

Network Week in Review: Levels Of Protection

Your computer is one of the first places to begin protecting your  information. In this week’s Weekly TEK Tip we gave an overview defining endpoints. Transfer the workspace experience. Bring every application and endpoint into one unified view to deliver the digital workspace required to become more productive.

Endpoint data protection will provide the most productive experience for any endpoint user. Protect your computers and data from malware, viruses, and cyber-attacks with advanced endpoint security. Today’s latest technology (which replaces your outdated anti-virus solution) protects against file-less and script-based threats and can even rollback a ransomware attack.

Regardless of your endpoint, we work to reduce outside access to your endpoints while strengthening your overall security.

read more

Network Week in Review: Turn vulnerabilities into strengths.

Cyber security is among the few areas that still hold opportunity for growth this year. We all enjoy convenience but as convenient as they seem, you may be leaving your door wide open to major privacy (and security) risks. Remember earlier this year when NIST tested forensics to retrieve data from damaged mobile phones? A damaged phone might not power on, and the data port might not work, but tools can be used to access the phone’s memory chips.

In short, here’s a few things to watch out for;

  1. Notice those sites giving you options to log into your account utilizing Facebook, or Google, etc?
read more