The email was immediately removed from her Inbox and put into her Deleted items folder. This is part that you see when you report a bad email. The rest of the story happens behind the scenes. Let me explain.
Security
Most VPN applications available in the app stores for your mobile devices are actually spy apps. Let me try to explain something that is very technical, in a hopefully clear manner
Social engineering is the most powerful weapon of the hacker. They use psychology against you. It’s hard not to fall for it. Anyone can
If you’d like your staff to have a 15 minute tutorial on this new procedure, let us know. We’re happen to schedule an online meeting that they can attend for a first hand demo and opportunity to ask questions.
which threats are on the increase,
what’s being done about,
what your staff needs to know and
our plans for improving security and education offering for your staff.
Join us on March 2nd at Noon for a 30 minute Cyber Security Review training. We’ll remind you of what to look for and how to avoid falling for the trick. We’ll also review what to do should the worst happen.
We will be phasing out email attachments in the near future. Instead, we will be moving towards using links to share your data directly through the cloud.
Doing Maintenance is a big part of IT. Just like most products and services, there is a right way and there is a wrong way to do it. We do things the right way. Anything else is just a band-aid!
Text scams are on the rise. Learn to identify them
One of the most important ways to keep your business secure is by securing your credit cards by creating a Credit Card Policy.