Bookmark the LEGITIMATE websites you frequently visit

Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling of a legitimate one. Example: www.faceboook.com instead of www.facebook.com. All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking fake copy of the site you were trying to get to – and the login and links are full of key-logger malware and virus landmines waiting for you to click on them.

How to foil ransomware

Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher). The threat was fairly straightforward: Pay us or we’ll delete all your data.

3 Essential Rules for All Cloud Applications

If you’re using cloud applications while your employees are working from home, you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR.

Here are a few things you can easily do to improve security in the cloud:

Maintain a STRONG password of at least eight characters with numbers, symbols and both uppercase and lowercase letters.

Don’t do THIS on your work laptop or PC

It’s easy to become a little more relaxed when working from the comfort of your living room or home office. Surfing over to Facebook, other social media or even personal e-mail accounts can be very tempting.

But the ONLY thing you should use your company’s workstation or laptop for is…WORK! Check your personal accounts on YOUR personal device.

Coping with COVID-19Read more
+