Author Archives: Amanda Young
- Home
- Articles Posted by Amanda Young (Page 10)
Cyber Crime and Security for Small Businesses
Did you know the illicit trading of personal data was worth $3.88 billion last year? Cybercrime is a growing industry known for its innovation. It goes far beyond the image many of us have of some hacker kid in his basement. Many who engage in this activity are professionals and work in lar
Password basics people still ignore
You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are careless with passwords. Change Passwords - Some security experts recommend that companies change out all passwords every 30 to 9
Stars of the show: Cloud and VOIP
Despite annoying challenges presented by the abrupt shift to the Work-From-Home (WFH) model thanks to the pandemic, there were some tech heroes that saved the day. These two made WFH possible. The cloud The cloud is that platform whereby you outsource your data storage as well as many of your app
Two reasons to pay attention to software
Software matters. What your employees use can impact your firm and your customers. Pay attention. Make rules. New software applications In the pre-pandemic phase, even when companies had staff working from home they were fewer in number and a lot of them even came into the office a couple of time
So your password manager was breached: What do you do now?
Almost everyone should now know the importance of secure passwords and many people and businesses use password managers to help with this and to keep track of the abundance of passwords we all use in our day-to-day lives. But what do you do if your password manager was breached? In December 2022
Train your staff: Your first and best firewall
Protecting your organization against cyber threats can seem like a challenge that involves extremely high-tech wizardry, sophisticated knowledge etc.. Much of this is true. Protecting your data and your company against cyber threats requires skilled professionals. But that isn't only what is neede
Three best practices to protect your data
While malware and phishing attacks have evolved over time and are constantly becoming more and more sophisticated, there are ways to protect your data from them. Here are three best practices to observe no matter the size of IT infrastructure needed in your company or organization to follow that c
Ransomware vs other malware attacks
There is no end to the volume and type of malware out there in cyberspace. For a very long time, organizations were aware that viruses could attack their data, render it corrupted and unusable. They were also aware that malware was used to steal data and use it for–primarily–monetary gain. Sel