Good Reads



Tips for Securing Your G Suite May 20,2018

The G Suite your organization uses is the single most important part of your domain.…

Secure websites can be malicous too! March 08,2018

Its important to remember

Clear your devices before you give or sell February 20,2018

Cellphone Backup your entire phone, and label it with the date and purpose.  Iphone: Wipe your…

How to pick a strong password February 11,2018

Simple passwords increase the risk of data loss.  All users at your organization should know how…

Protect your data in the event of a stolen laptop February 11,2018

If ever faced with a situation where your safety or the safety of others could…

Poor cyber hygeine will get you hacked February 10,2018

Hygiene is a set of practices performed to preserve health. Cyber Hygiene Set of practices that…

Beware of downloading templates from the internet February 07,2018

The internet is filled with templates. Templates for sales, contracts, project management, websites, NDA's, mobile…

Stolen Bay Area Laptops End up in Vietnam February 01,2018

If you have had a laptop stolen recently it might have ended up in Vietnam.…

When will you have to notify law enforcement? January 28,2018

Most businesses in all industries are likely required to notify law enforcement or another governing…

Macs gets ransomware too! January 21,2018

There are a lot more different types of malware for windows than mac. Don't focus…

How to Prevent Ransomware January 21,2018

Make sure all your software up to date, including operating systems and applications.   Secure…

Can your business run on pencil and paper? January 21,2018

Hancock Regional Hospital has been forced to switch to pen and paper after a ransomware attack,…

Planning for a Man-Made disaster January 15,2018

Just like Natural Disasters, man-made disasters occur. These involve fires, acts of terrorism, power outages,…

Planning for a Natural Disaster January 15,2018

Natural disasters happen, and when they do, chaos surrounds the interruption of businesses normal activities.…

4 out of 5 of all companies use vulnerable technology to secure their offices. January 04,2018

  There are countless statistics and studies on how many businesses are using vulnerable technology. …