Cybersecurity Tip: Use STRONG passwords!

 Use STRONG passwords!

Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five character password in under three hours.

The DANGERS of Dropbox and other file sync apps

If you're using Dropbox, OneDrive, Google Drive or other consumer-grade file sync and sharing cloud applications, listen up! These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information is being shared with whom.

What to do BEFORE you go to Starbucks

So you're in the car on the way home from Starbucks, basking in the glow of consuming your triple-shot, low-foam, extra-hot pumpkin-spice latte when you suddenly realize your laptop has gone missing. You drive back like the caffeinated lunatic you are, only to discover no one has turned it in.

REMOVE that unwanted freeware

Like it or not, PC manufacturers LOVE to stuff your brand-new PC full of "free" applications (they get paid to do it, so you've got a slim chance of getting one without a side of spamware). But clutter is the enemy of a speedy PC, and if you're not using a particular software on a regular basis, it's best to REMOVE it completely.

Bookmark the LEGITIMATE web sites you frequently visit

Here's a sneaky trick used by many hackers: they purchase and set up a fraudulent web site that is a close misspelling of a legitimate one. Example: www.faceboook.com instead of www.facebook.com. All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking fake copy of the site you were trying to get to – and the login and links are full of key-logger malware and virus landmines waiting for you to click on them.

Never use PERSONAL devices to connect to COMPANY data

You're a hardworking team player who likes to check e-mail and get a few things done after hours – all good! But here's something you might not know: you should never access company data, file servers, or applications through personal devices and home PCs that are not properly monitored by us.

How to spot a phishing e-mail

A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular web site or to click and download a virus.

How To Foil Ransomware

Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that's the number reported – the real numbers are probably MUCH higher). The threat was fairly straightforward: pay us or we'll delete all your data.

If This Type of Alert Pops Up, DON’T Click on it!

You're working at your computer when all of the sudden – BAM! – you get a pop-up notification that your PC is infected with a virus and you must "click here" to run a scan or install antivirus software. This is a common scareware tactic used by hackers to get you to click and download a virus.