Contact Us:

(505) 792-2375

The Top 10 Ways Hackers Get Around Your Firewall and Anti-Virus To Rob You Blind

Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! This report reveals the most common ways that hackers get in and how to protect yourself today. Are You A Sitting Duck? You, the CEO of a small business, are under attack. Right … Read more

Panera Bread Leaks Data

hacked customer data

Panera Bread Serves Up More Than Cookies. Over the last 8 months, almost whoever wanted them could gain access to millions of Panera customer records.  According to a report by krebsonsecurity.com, a whistle-blower made Panera aware of a huge flaw in the way it stored customer data on their website in the summer of 2017.  However, they took no action … Read more

March 2018 Cyber Security Tips

protect your email accounts

IT Security Tip #62: Change your name, and I don’t mean the last one Too often we see e-mail usernames and prefixes the same across multiple free e-mail services. For example: jimmy67chevy@aol.com jimmy67chevy@gmail.com jimmy67chevy@yahoo.com jimmy67chevy@icloud.com This makes the work of hackers and cybercriminals way too easy. With the first part easy to figure out, they can get access to other … Read more

September Cyber Security Tips

IT Security Tip #46: The DANGERS of Dropbox and other file sync apps If you’re using Dropbox, OneDrive, Google Drive or other consumer-grade file sync and sharing cloud applications, listen up! These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information is being shared with whom. … Read more

August Cyber Security Tips

IT Security Tip #44: REMOVE that unwanted freeware Like it or not, PC manufacturers LOVE to stuff your brand-new PC full of “free” applications (they get paid to do it, so you’ve got a slim chance of getting one without a side of spamware). But clutter is the enemy of a speedy PC, and if you’re not using a particular … Read more

client relations cloud computing communication credit cards cyber attacks cyber security data security downloads email email security encryption facebook firewall hacked hardware HIPAA internet phone systems linkedin malware network admin networking network security online banking password password management password security PCI Compliance Personal Device phishing phone systems Public WiFi ransomware sales security security breach social media strong password strong password security successful habits technology time management voice over ip voip work flow work habits