South Florida’s most experienced IT service provider.

Prove Your Identity Using 2 Factor Authentication

What is 2FA?

Two Factor Authentication is an additional layer of protection beyond your password. With millions of people online every day, processing millions of transactions, how do you prove your identity to websites? When you’re in front of a bank teller or a bartender, it’s simple! You show them your driver’s license and you attempt to replicate the same smile you made in that photo twenty-five years ago! But how do you suppose you prove who you are to a website today?

Read More

October is National Cyber Security Month, Scary Facts Could Lead to Wiser Decisions!

October is Cyber Security Awareness Month.  I guess "scary" doesn’t just apply to Halloween these days.  One of the scariest things this season is knowing how insecure our financial information can be.  Recently Equifax revealed that more than 143 million consumer accounts were compromised in a breach and then last week Yahoo announced that every single one of its' user accounts were breached back in 2013.  This news isn't easy to swallow because it's serious.  Serious threats to personal data are at an all-time high. Everyone, including individuals and businesses of all sizes, needs to remain diligent in their protecting themselves from hackers and privacy breaches.

Read More

Best Practices for Sharing on Social Media

September 19, 2017 David's Desk, Tech Tips

Social Media Do's and Don'ts For Online Safety

 

Read More

Protecting Our Children From the Internet!

Protecting our children from the Internet

 

Read More

The Best Defense Against Ransomware Attacks!

The Best Defense Against Ransomware Attacks is Knowledge and Then Applying That Knowledge!

The best defense against ransomware attack is knowledge and then of course applying that knowledge. Knowing what you need to do in order to protect yourself is critical to the safety of your business. The recent "wannacry" ransomware attacks provided us with valuable information, which are basically opportunities, to learn or re-learn how to defend and secure our networks. As with most attacks, our attackers leave behind clues in their wake. The Cyber Ransomware Attack labeled “Wannacry” recently took a "second go" at attacking its’ victims.

Read More

Managed Security Systems: How I Stay on Top of my Home Security by Breaking Into my House

 Staying on top of your Managed Security Systems: Preventing Intrusion at Home and at the Office

 

Read More

Cybersecurity Alert: Have You Been Spoofed? Do You Know What it Means?

February 20, 2017 Cybersecurity, David's Desk, Tech Tips

Don’t fall victim to Cybersecurity scams. Be on alert from fraudulent email senders.

Earlier this week I received a spoof email (under most circumstances this wouldn't be weird), however I received the email while writing this article about "email spoofing." Talk about coincidence. Email spoofing is a relatively newer form of spam, it’s a term used to describe fraudulent emails in which the sender’s address and other parts of the email header are altered in some way to appear as though the email originated from a different source.

Read More

Phishing Email Scam: Don't Fall Victim to Cybercrime!

Phishing Email Scam: Don't Fall Victim to Cybercrime!

 

Read More

How to Identify Phishing Scam Emails

 

Read More

Two Screens are Better than One

December 05, 2014 Tech Tips

Business owners may not yet be aware that having a dual monitor configuration for staff can improve business productivity by up to 45%, making basic business tasks more efficient.   

Read More
1 2 3

Get The Latest Updates

Want the latest tech trends and tips to protect your business from Cybercrime?

SUBSCRIBE

Facebook

LinkedIn