Category Archives: Blog
- Home
- Archive by Category "Blog" (Page 15)
What is Phishing?
Learn how phishing works and how to prevent it. So, what is phishing? Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally
3-2-1 Backup Best Practices Apply to Your Cloud Data
There's a common misconception among Software as a Service (SaaS) users that backup isn't necessary for data because it exists in the cloud. This is untrue. SaaS applications, like Microsoft Office 365, Google G Suite, and Salesforce are just as vulnerable to data loss as on-premise apps. Why? Beca
Facebook Public Security Surprise
Recently I was was surfing Facebook and noticed that someone I didn't know liked one of my photos. My personal Facebook page is for friends only so I was surprised. I used the Audience Selector drop down on the picture and it was set to public. I'm unsure how that happened. I changed the se
Why You Must Use 2FA/MFA!
Two-factor authentication (2FA) or multi-factor authentication (MFA) is critical for securing your cloud-based or remotely accessible systems by adding a second verification step (two-step) in the logon/authentication process. The security of two-step verification lies in its layered approach. Comp
What is Microsoft Planner?
Microsoft Planner is a straightforward tool that helps organize and manage projects and teams. It is more powerful than simple task lists, but not as overwhelming as Microsoft Project. Since it’s included with most Office 365 subscriptions, you probably already own it! Planner works through your
Start Using Microsoft Teams
Microsoft Teams provides chat-based collaboration and it comes with most versions of Microsoft Office 365. There is also a free version. At Tobin Solutions, we use Microsoft Teams to store and collaborate on documents. We've created different teams for different needs. Each team has
Where Most Security Solutions Fall Short
While most businesses protect their systems and data against external threats like malware, many overlook the biggest cause of data breaches: internal risks. Internal vulnerabilities are responsible for 70% of all data breaches in small and medium sized businesses (SMBs). INTERNAL THREAT SOURCES If
7 Steps to Winterize Your Computers and Your Office
Yes, I'm sorry, winter is near... Or, yes, I'm so excited, winter is here! Regardless of your view, the winter season's weather brings its own unique challenges. Freezing weather along with ice storms and snow storms can cause a variety of problems including power outages, snow days, and more.