Cyber Security Tech Gift Ideas

Yup, it’s that time of year again and you’re wondering what to give to your employees. You could go the food route, or maybe get pens or flash drives or even portable hubs. But why not use the opportunity to show how much you value cybersecurity with one of these tech gift ideas: USB Data…

Read More
Cyber Security Management Steps

From time to time, I give seminars called Cybersecurity in the Real World that provide attendees with steps to improve their personal cybersecurity. But the tactics I teach apply to businesses as well, and are a great starter set for businesses trying to improve their cyber security management. Step 1: Stay Up to Date Keep…

Read More
SIM Jacking

You’ve probably experienced the frustration of a smartphone that suddenly dies; usually following a hard drop or software update. But what if only part of it stops working, like the ability to make phone calls and send texts? The problem might not be your phone at all, but cyberthieves who’ve stolen your phone’s identity through…

Read More
Edge vs Chrome, What is the Safest Browser?

What is the safest browser? Is there even a difference? When was the last time you thought about your browser?  Most people don’t. They use whatever came with their computer (or smartphone or tablet). Or, maybe they tried a bunch of different ones years ago, picked one they liked and stuck with it. But the…

Read More
work from home after COVID 19 banner

COVID-19 quarantine may be ending, but many are in no rush to get back to the office. Work from home (or even work from anywhere) may very well become the new norm — or at least a must-have option for attracting quality staff. So, how do you make remote work secure and efficient for your…

Read More
Email scams targeting remote workers banner

You love the short commute and the casual dress code, but don’t get too comfortable: Cyber criminals are taking advantage of the current circumstances with email scams targeting remote workers. It’s easy to see why the dispersed office is so enticing to bad actors.  Imagine this scenario: You’re working in your physical office building and…

Read More