Stop Spear Phishing from Ruining Your Reputation
Spear Phishing vs. Phishing Spear Phishing is a type of phishing email sent to a specific individual with the intent of acquiring sensitive information like passwords, account numbers, PINS, and […]
BitLocker: The Only Safe Harbor for Data Breach
Encrypt Your Confidential Data It’s very important for business owners to realize that when their employees travel, their organization’s confidential data goes with them. When you get out of your […]
Is Your Cybersecurity Ready for the Eclipse?
Great American Eclipse of 2017 Today is going to be a very busy day. Tulsa Public Schools, along with several other local school districts, start classes today. But the big […]
Office 365 External Message Notice
Virtually everyone is coming to the realization that e-mail is the highest legal, financial, productivity, and security risk application in use today. At some point, you get fooled or you’re not […]
Ransomware Reaches Epidemic Proportions
Ransomware Epidemic Ransomware is a type of malware that is covertly installed on a computer without knowledge or intention of the user. Ransomware restricts access to the infected computer system by encrypting data and demands that […]
DHCP Failover Real World Advice for Midsized Business
It’s imperative in our seemingly always connected world that DHCP is continuously available to provide valid IP addresses for accessing the network and the Internet. Unfortunately, prescriptive guidance about DHCP has not been updated since […]
Top 5 Cybersecurity Myths
Cybersecurity has changed greatly in the last 10 years, but we still see that Sonicwall or Watchguard for a firewall, XP workstations with no Windows Firewall, and Vipre or the anti-virus of […]
Five Criteria to Demand for Properly Vetted IT Support
The worst mistake a business can make when choosing a computer support firm is not properly vetting their options. A data breach from using unvetted IT support is now considered […]