blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Is your inbox a crime scene?

Alyssa Sisco
Much like the shiny lures fishermen use to attract their prey, cybercriminals use email attachments or links to try to get you to click through to malicious content. Often using cheap scare tactics, phishing scams will try to induce a quick, panicked response by making you feel like you have something to lose by not clicking on the link. The instant you click, you open yourself up to malware attacks that can cost you financially, technologically, reputationally, and it will definitely eat up ...
Read More
Topics: Staff Training, Security Threats

What's the difference between a virus and malware?

Alyssa Sisco
You may recall a plethora of headlines and news stories hyping the severity of computer viruses in the late 80's and early 90's. At this point, viruses seem more like an accepted risk you agree to when you own a computer, than the fuel for a big, scandalous headline. Most basic computer users understand that they need some form of Antivirus and to stay away from dicey websites. But with criminal programmers and hackers coming up with new, more aggressive code all the time, is that true today? ...
Read More
Topics: Staff Training, Network Security

How to set your favorite search engine as your default

Alyssa Sisco
When you open up your web browser with the intent to search for something, it can be irritating to have  your computer open a search engine you don't like or are not familiar with. Those who regularly search for information on the web usually have a preferred search engine. Below you will find some steps to take when your web browser default is not what you want it to be.
Read More
Topics: Staff Training

Why ransomware education is important for your business

Emily Moulder
From ransomware and malware to email and financial data hacks, business data and personal information are the main targets of most cyber criminals. One of the greatest threats to your information security comes from your employees lack of knowledge on the subject, and hackers know that. They send malicious emails to your employees hoping they won't know the difference between a fake and real email. Educating your entire staff on cyber attacks and what they look like could be the difference in ...
Read More
Topics: Staff Training

6 reasons to train your staff on security basics

Chris Vilim
Owner to owner, I have some advice for you…stepping up training on security basics is one of the most important training sessions you can send your staff to this year. And here are the six strong reasons why…   1. Speed up recovery time and save money You are not only avoiding security threats by training your employees on the importance of security, you’re also providing them with the knowledge of what to do if their system becomes compromised. For example, if an employee makes the mistake of ...
Read More
Topics: Staff Training, Security Threats

Dark Web, Deep Web -- What's the difference?

Vee Figueroa
So how many of you watched the series CSI: Cyber before it was cancelled? Like many other detective dramas, they often talked about the “DARK WEB” (dramatic music playing in background). Sounds scary, right?? Then they throw in the term “Deep Web” to really confuse us. Although I have begun to grasp the idea of what the Dark Web is, there is still a bit of mystery to it. What I do know is that when my data was stolen from a large insurance firm I was told that my personal information was being ...
Read More
Topics: Staff Training, Security Threats

August Quick Tip

Brooke Nielsen
Organize your notes with OneNote 2016! OneNote is a digital note taking application that allows users to take notes in a free form or more organized manner, depending on their style. Notes taken here can easily be located, reorganized, printed, and shared between users. Using OneNote, users are also able to simply add drawings, screen clippings, audio clips, and even handwritten notes using a stylist. Notes saved in OneNote can then be found on any device, making them more accessible and ...
Read More
Topics: Staff Training

Are you using your email's deleted folder to file?

Wynn Obermeyer
A ridiculous, illogical, absurd story...   I would like to tell you the story about an organizer, her name was Olivia. Olivia hated the fact that all of her important papers: birth certificates, her children’s immunization records, passports, and automobile titles were not stored in one place. Olivia then gathered all of these important documents together and placed them all in a red file folder labeled “Important Documents.”  Now, Olivia needed to determine the best place to store the red file ...
Read More
Topics: Staff Training

How to organize your inbox with search folders

Brooke Nielsen
Save time searching for e-mails by creating custom search folders that include your specified criteria!   Isolating messages with key phrases or peoples’ names can save the time and hassle of searching. Search folders continually gather messages using your specified criteria, and now you can view all of these messages in one place, even if they are filed in various folders.   For example, if your folder seeks messages regarding a person, topic or specific email (whether they are from that ...
Read More
Topics: Staff Training

BEC fraud: The threat you can't afford to ignore

Brooke Nielsen
Business E-mail Compromise (BEC), commonly known as “CEO fraud,” is a rapidly increasing concern affecting companies’ financial and data security today. What exactly is BEC? It has been defined as a scam that targets businesses working with foreign suppliers and/or businesses that regularly use wire transfer payments. Scammers skillfully gain access to and impersonate company executives, attorneys, or suppliers through e-mails to fraudulently authorize the transfer of company funds. Payments ...
Read More
Topics: Staff Training, Security Threats, Data Breach