Posts by Christopher Jones
Top 5 Password Security Tips
Top 5 Password Security Tips Passwords can be dangerous. It’s a little-known fact that we still need passwords. Beyond the hype of all the latest and greatest technology saying we don’t need passwords anymore; we always seem to find some use case which requires us to generate and use a password for gaining access. A…
Read MoreFinders Keepers? Understanding the Dangers of Removable Media
Removable media can be a significant security threat if not handled carefully. Let’s discuss security risks associated with removable media..
Read MoreRansomware and Cyber-Insurance: Navigating the Digital Threat Landscape
In today’s digital age, ransomware attacks have become a significant threat to businesses of all sizes. These malicious attacks involve encrypting a victim’s data and demanding a ransom to restore access. The impact can be devastating, leading to operational disruptions, financial losses, and reputational damage. As ransomware continues to evolve, businesses are increasingly turning to…
Read MoreSafeguarding Sensitive Data
Safeguarding Sensitive Data from unauthorized access is crucial for maintaining security. Let’s explore some effective best practices: Train Employees: Educate your team about security best practices. While Hollywood might depict hackers as sunglasses-wearing keyboard warriors, the reality is that most breaches occur due to human error. Regular training helps employees recognize phishing attempts, avoid weak passwords,…
Read MoreQuishing: The Cybersecurity Dangers of the QR Code
Have you heard of the new term, quishing? During the pandemic, we all saw a huge rise in the usage of QR codes. Suddenly, there was a QR code for everything and everywhere along with tags about social distancing. Granted, it made perfect sense and made things possible which otherwise wouldn’t have been due to…
Read MoreCybersecurity in the Workplace: 4 Tips to Keep Your Business Safe and Secure
Keeping information safe and secure is challenging developments for businesses of all sizes over the last few years. Expeditious shifts from in-person to online to hybrid workplaces forced companies to change, or at least reexamine, their cybersecurity practices and protocols, and far too often they weren’t prepared. In fact, according to CyberEdge’s Cyberthreat Defense Report,…
Read MoreAccess Control Systems – Why Your Business Needs One
We all know that Cybercrime is on the rise, but we also know that physical crime against people and property is on the rise as well. Even if your business has never been the victim of a physical break-in, burglary, theft or insider threat, it doesn’t mean that it won’t happen tomorrow. Most businesses can…
Read MoreCybersecurity In The Home: 3 Steps Households Can Take
The COVID-19 pandemic forced millions of Americans to embrace working from their own home; a concept they had limited or no experience with at the time. And while many employees have returned to the office, a recent University of Chicago study found that 72% of those workers surveyed would like to continue working from home…
Read MoreConcerned About Cyber?
4 Easy Steps for Staying Secure in 2022 Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic, to coping with the fallout of high-profile breaches of national infrastructure…
Read MoreMulti-Factor Authentication
When we think about secure authentication, we often think about a username with a strong password. Although strong passwords are important, it is often not enough to secure access to computer systems, networks and the Internet. For this we need MFA, which is short for Multi-Factor Authentication.
Read More