Multi-Factor Authentication for Powerful Added Security

Multi-Factor Authentication for Powerful Added Security

What is multi-factor authentication and why should you use it?

We hardly even notice when there are big data breaches anymore. Did you even know that Facebook and LinkedIn both had major data breaches in the past month? Okay, they are calling them a data leak, not a breach. Whatever you call them, users’ personal information was exposed or stolen from both social media platforms. These examples of lost data make the use of multi-factor authentication even more important.

Dave HansenMulti-Factor Authentication for Powerful Added Security
read more
Microsoft Phone System – Great for Remote Workers

Microsoft Phone System – Great for Remote Workers

How are you handling telephone service for your remote workers?

With so many people sent home to work over the past year, providing telephone service to those workers often has proven to be a big challenge.  They could use their cell phones, but unless those are provided by your business, new problems arise from that approach.

Dave HansenMicrosoft Phone System – Great for Remote Workers
read more
Understanding Cyber Attacks

Understanding Cyber Attacks

Attacks are not usually targeted as some may suggest.

Cyber attacks and threats have been prominent in the news over the past few months. December had the massive Solar Winds breach. February revealed a major security weakness in network management software, VMWare. Then, a severe vulnerability was discovered in Microsoft Exchange this month which resulted in thousands of compromised email systems. Contributing to the frequency of successful cyber attacks, I believe, is the misunderstanding of how they most often occur.

Dave HansenUnderstanding Cyber Attacks
read more
VMware vulnerability a major security weakness

VMware vulnerability a major security weakness

Experts urge applying security patch immediately.

There is a significant weakness in the security of the popular network management software, VMware. This vulnerability can allow hackers full control of VMWare and result in severe damage to a business.

Dave HansenVMware vulnerability a major security weakness
read more
What’s your Microsoft Secure Score?

What’s your Microsoft Secure Score?

Microsoft provides a system to increase the security of your Microsoft 365 account.

An article on Microsoft’s website describes Microsoft Secure Score as a measurement of an organization’s security posture. Many businesses are unaware that this tool even exists. However, Microsoft Secure Score is designed to help you take steps towards improving the security of your Microsoft 365 account. You can find that article from Microsoft here.

Dave HansenWhat’s your Microsoft Secure Score?
read more
Beware of COVID-19 Vaccine Related Hacking Tactics

Beware of COVID-19 Vaccine Related Hacking Tactics

The COVID-19 outbreak has provided cybercriminals with plenty of material to attract new victims. News headlines have changed with the progression of the pandemic and people are naturally drawn to COVID-19 related headlines. The latest of these is around news about the vaccine.

Dave HansenBeware of COVID-19 Vaccine Related Hacking Tactics
read more
Confusion over Internet Speeds

Confusion over Internet Speeds

How to choose the right internet plan for your needs.

Internet Service Providers (or ISPs) love to use buzz words to boast about the service they provide. Nearly every ISP that promotes their services will mention the fastest internet speed that they offer. You will often hear an advertisement for “Gig” speed, but what does that really mean?

Dave HansenConfusion over Internet Speeds
read more
Email Account Hi-Jacking on the Rise

Email Account Hi-Jacking on the Rise

It should be noted that while this article is focused on hi-jacking email accounts on Microsoft 365 for business email accounts. The same could apply to any cloud-hosted email service such as Gmail, Yahoo, Live, etc. 

A hi-jacked business email account can be a very valuable tool for a cybercriminal.  Once they have access to a business email account, there are several tactics they may employ. They may attempt to steal data, gain access to additional email accounts, or even trick someone into wiring money to their bank account.  This has long been a strategy of cybercriminals and there has been an increase in this approach recently.

Dave HansenEmail Account Hi-Jacking on the Rise
read more
Business Risk of Cybercrime

Business Risk of Cybercrime

Understanding the threat of cybercrime against your business.

Business leaders clearly understand that many risks exist that may threaten the success of their business. Things like physical theft, lawsuits from customers or employees, damage from weather-related events, and a host of other things can cost money or damage your reputation.

Dave HansenBusiness Risk of Cybercrime
read more
Building a culture of information security

Building a culture of information security

How to create a data security policy for your company and get your staff to embrace it.

Do you know what data you have stored on your business network? Do you store sensitive information like credit card numbers, social security numbers, bank account numbers, personal information about your staff, or even trade secrets?

Dave HansenBuilding a culture of information security
read more