Cyber Security: The Onion Approach

Cyber Security: The Onion Approach

Cyber Security: The Onion Approach Cyber Attack Threats Common security threats include viruses, worms, spyware, and ransomware, but the methods of cyber-attack are constantly evolving.  This creates a need for constant monitoring and multiple layers of defense. A...
Common Tech Myths Debunked

Common Tech Myths Debunked

Common Tech Myths Debunked Myth: Apple computers can’t get viruses Truth: Apple computers are susceptible to malware just like Windows PCs. Apple once bragged they were not as susceptible until a Trojan infected thousands of computers in 2012. To learn more about how...
Remote Working | Safety Tips

Remote Working | Safety Tips

Remote Working | Safety Tips “According to a survey from Enterprise Technology Research, the percentage of employees working from home is expected to double in 2021,” (Reuters.com) In fact, there have been several large corporations stating they plan to permanently...
Cybersecurity: Over-the-Counter vs Rx

Cybersecurity: Over-the-Counter vs Rx

Cybersecurity: Over-the-Counter vs Rx Did you know your small business is a prime target?  Criminal hackers know that small businesses owners have everything to lose.  Targeting you gives them more of a guaranteed payoff.  In fact, 43% of cyberattacks are aimed at...