This article helps provide an understanding of why your employees working from home may need extra security on their workstations. Ask us about our cloud VPN service and whether your employees should be using it to protect and encrypt your data. You can also use our...
Cybersecurity
Geek Girls IT Services Blog
The latest on cyber security, computer support and small business IT from one of New Jersey and New York’s top managed IT service providers.
Would You Give Someone Your Password for Chocolate?
Social engineering occurs when someone interacts with a user to try to manipulate the user into giving physical or login access to a system. This interesting article discusses a study in which people who were offered a piece of chocolate were more likely to...
Help Your Users Avoid Phishing Attacks
Here's a PDF with clear, concise advice on avoiding phishing attacks. Please feel free to pass it on to your users. If you're working in the office, you may want to post it in a common area such as a break room or printer area. Best Practices to Avoid Being Phished
From Webroot: The Nastiest Malware of 2020
From our colleagues at Webroot, here's a summary of the nastiest malware of the year. As you might expect, COVID-19 related attacks were on the rise. Ransomware continues to dominate, as measured by the amount of devastation that malware in this category caused. The...
COVID-19 Phishing Scams: Be Aware
This infographic can help make users more aware of COVID-19 related phishing scams. You may want to share this post with your employees and colleagues.
Important Video: 1 out of 3 Employees Clicked on a Phishing Email in the Last Year
This video explains the dangers of phishing and how important it is to train and educate your employees about cyber security. Watch the video.
From Our Friends at Rue: 3 Common Phishing Attacks and How to Avoid Them
This downloadable PDF discusses three types of phishing schemes, and what to watch out for: spear-phishing deceptive phishing whale phishing A phishing attack involves hackers using spam email or other forms of communication to trick the victim into providing...
Your Healthcare Practice in a “Work From Home” World
From our friends at RingCentral comes this valuable resource on how to run a remote-friendly healthcare practice: https://www.ringcentral.com/how-to-run-healthcare-practice/how-to-start-healthcare-business/ Cyber security is a critical component of remote healthcare...
Your Healthcare Practice in a “Work From Home” World
From our friends at RingCentral comes this valuable resource on how to run a remote-friendly healthcare practice: https://www.ringcentral.com/how-to-run-healthcare-practice/how-to-start-healthcare-business/ Cyber security is a critical component of remote healthcare...
How Our Customers and Others Secure Their Remote Workforces
From our friends at Duo: How do you enable an increasingly remote workforce with confidence when hacking attempts against "work from home" users are at an all-time high? Duo’s security solutions complement any technical environment, and are engineered to verify...