What is multi-factor authentication and why should you use it?
We hardly even notice when there are big data breaches anymore. Did you even know that Facebook and LinkedIn both had major data breaches in the past month? Okay, they are calling them a data leak, not a breach. Whatever you call them, users’ personal information was exposed or stolen from both social media platforms. These examples of lost data make the use of multi-factor authentication even more important.
Dave HansenMulti-Factor Authentication for Powerful Added Security
How are you handling telephone service for your remote workers?
With so many people sent home to work over the past year, providing telephone service to those workers often has proven to be a big challenge. They could use their cell phones, but unless those are provided by your business, new problems arise from that approach.
Dave HansenMicrosoft Phone System – Great for Remote Workers
Attacks are not usually targeted as some may suggest.
Cyber attacks and threats have been prominent in the news over the past few months. December had the massive Solar Winds breach. February revealed a major security weakness in network management software, VMWare. Then, a severe vulnerability was discovered in Microsoft Exchange this month which resulted in thousands of compromised email systems. Contributing to the frequency of successful cyber attacks, I believe, is the misunderstanding of how they most often occur.
There is a significant weakness in the security of the popular network management software, VMware. This vulnerability can allow hackers full control of VMWare and result in severe damage to a business.
Dave HansenVMware vulnerability a major security weakness
Microsoft provides a system to increase the security of your Microsoft 365 account.
An article on Microsoft’s website describes Microsoft Secure Score as a measurement of an organization’s security posture. Many businesses are unaware that this tool even exists. However, Microsoft Secure Score is designed to help you take steps towards improving the security of your Microsoft 365 account. You can find that article from Microsoft here.
Criminals Trick People with COVID-19 Related Topics
The COVID-19 outbreak has provided cybercriminals with plenty of material to attract new victims. News headlines have changed with the progression of the pandemic and people are naturally drawn to COVID-19 related headlines. The latest of these is around news about the vaccine.
Dave HansenBeware of COVID-19 Vaccine Related Hacking Tactics
How to choose the right internet plan for your needs.
Internet Service Providers (or ISPs) love to use buzz words to boast about the service they provide. Nearly every ISP that promotes their services will mention the fastest internet speed that they offer. You will often hear an advertisement for “Gig” speed, but what does that really mean?
It should be noted that while this article is focused on hi-jacking email accounts on Microsoft 365 for business email accounts. The same could apply to any cloud-hosted email service such as Gmail, Yahoo, Live, etc.
Understanding the threat of cybercrime against your business.
Business leaders clearly understand that many risks exist that may threaten the success of their business. Things like physical theft, lawsuits from customers or employees, damage from weather-related events, and a host of other things can cost money or damage your reputation.
How to create a data security policy for your company and get your staff to embrace it.
Do you know what data you have stored on your business network? Do you store sensitive information like credit card numbers, social security numbers, bank account numbers, personal information about your staff, or even trade secrets?
Dave HansenBuilding a culture of information security