Contact Us:

(505) 792-2375

February 2018 Cyber Security Tips

protect your business from spam and phishing attacks

IT Security Tip #61: Start with the basics! You’ve heard the advice countless times before: you must have antivirus software and a strong firewall. However, in this day and age, there is more to the security “basics” than a solid firewall. What about the employee who inadvertently clicks on an e-mail on her phone from a foreign ambassador trying to … Read more

December Cyber Security Tips

IT Security Tip #57: If you’ve ever said this, you’re ASKING to be hacked! Want to know what every hacker hopes you believe? “We’re small…nobody wants to hack us.” This is the #1 reason why people (companies) get hacked. They dismiss the importance of IT security because they’re only a “small business.” This is a lazy, irresponsible excuse. One thing … Read more

November Cyber Security Tips

IT Security Tip #55: 3 rules to keeping your data safe in the cloud If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to … Read more

October Cyber Security Tips

IT Security Tip #51: Don’t just close your browser! When online accessing a banking site or any other application containing sensitive data, make sure you log out of the site and THEN close your browser. If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background. … Read more

client relations cloud computing communication credit cards cyber attacks cyber security data security downloads email email security encryption facebook firewall hacked hardware HIPAA internet phone systems linkedin malware network admin networking network security online banking password password management password security PCI Compliance Personal Device phishing phone systems Public WiFi ransomware sales security security breach social media strong password strong password security successful habits technology time management voice over ip voip work flow work habits