The Importance of Vulnerability Scans
Thursday, 24 January 2019
What is a vulnerability scan, and why are they important for my business? Vulnerability scanning is an inspection of the potential points of exploit on a computer or network, to identify security holes. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures. A scan
- Published in Secure
No Comments
Protect Yourself Against Ransomware
Thursday, 02 November 2017
Of all the different kinds of malware, none may be as nasty or annoying as ransomware. Ransomware is a type of malicious software that encrypts the files on your computer and forces you to pay a ransom to get them back. This malware can infect your computer through a variety of different methods including after
- Published in Secure
4 Ways to Protect Yourself After the Equifax Hack
Monday, 02 October 2017
Last month, Equifax, one of the three main credit bureaus, announced that it had been hacked between May and July of this year. As a result, personal information — including names, addresses, and social security numbers — was compromised for 143 million Americans — that’s nearly half of the U.S. adult population. Unlike other large
- Published in Secure
Security Basics: Password Best Practices
Monday, 07 August 2017
As a company that regularly performs security audits, we have spent a lot of time reviewing the security policies and practices of companies. Cybersecurity can be a very complicated topic which is why it’s surprising how often we find that one of the most basic security features isn’t properly used: passwords. Your company can spend
- Published in Secure
The Importance of Data Backups
Thursday, 06 July 2017
It is often said that the most valuable part of any computer is its data. Computer parts and components can be replaced, but data is gone forever once lost. While most large businesses understand the irreplaceable value of their data, the message can sometimes be lost on medium and small businesses. As a small business,
- Published in Secure
6 Tips for Spotting Phishing Email Scams
Tuesday, 06 June 2017
Scammers often send emails to potential victims trying to trick them into divulging personal information or into unwittingly downloading malicious software. These messages are often referred to as phishing emails. While there are many scammers out there whose emails are immediately obvious as a scam (Congratulations! You just won a free trip to Bahamas. Send
- Published in Secure
Disaster Recovery: Is Your Business Adequately Prepared?
Thursday, 04 May 2017
As a managed IT service provider in Eugene, Oregon, we’ve seen our fair share of businesses that have been completely derailed by an unforeseen event. When disruptive incidents happen, it’s crucial that you know exactly what you’re going to do to get back on track as quickly as possible. The Importance of Data in Today’s
- Published in Secure
The 5 Biggest Threats to Your Network Security (And What to Do about Them)
Thursday, 06 April 2017
Falling victim to cybercrime is expensive. The recently released Ponemon Institute study on cybercrime in 2016 found that the average annual losses of companies that are victims of a cyberattack exceed $9.5 million. That’s a lot of money, and while larger companies tend to be the targets of cybercriminals more often, even your small business’s
- Published in Secure
- 1
- 2