A strong password is not always enough. Two Factor Authentication can make your online accounts difficult to hack – but not impossible.
Mobile apps should only access data where you have granted permission. But, if we are not paying attention, downloading a little app to do one simple thing, may accidentally grant access to way more than intended.
We’re all excited about our team’s run for the 2016 Stanley Cup! It is the topic of conversation around the office these days. You can’t win in hockey or in cybersecurity if you forget the fundamentals. Keep security best practices as a top topic of conversation for your employees – share our latest tip with a big “Go Bolts!”
People do not use easy passwords to purposefully invite risk – we do it because they’re easy! Strong passwords are perceived as hard. But there are tricks to make creating and using secure passwords easier.
For some of the same reasons execs hesitate on IT security, merchants and banks in the U.S. seem to be dragging their feet on EMV.
Some of the same tools that help us do more also threaten our security. Every employee must understand the risks of using removable storage devices inappropriately or without taking proper precautions.
Floridians tell ourselves we are not really at risk for a hurricane. I hear the same sentiment from executives about their cyber security risk. We tend to downplay common threats but how dangerous could denial really be?
If (when) your company encounters an IT security incident or data breach, you will need every employee ready to respond quickly and effectively as appropriate for their position. Share these tips to be sure they’re ready.
Is your team prepared for a sudden data breach or security incident? If you do not have a documented, practiced plan you will find yourselves playing catch up resulting in higher recovery costs, time, and headaches.