You can’t trust anyone these days. Just look at your email inbox for proof. How many solicitations do you get each day for offers that are too good to be true? How many requests to open suspicious attachments or visit unknown websites that could contain malware?
2019 Update: New Phishing Scam Goes After Your W-2 Form
Watch Out for These Mobile Security Threats in 2019
Did you know that more than 74 percent of U.S. businesses either have a bring-your-own-device (BYOD) policy or plan to have one in place within 12 months? Sixty-seven percent of U.S. workers report using their own mobile devices at work, and the majority of those devices are smartphones. There are currently over 230 million smartphone users in the U.S., and that number is expected to grow to 270.66 million by 2022.
Read More >The Four Types of Cyber Security Threats That Can Affect Your Local Business in 2019
Data security continues to be a problem that plagues businesses of all sizes. Big retailers like Target and Neiman Marcus are obvious targets, but small businesses can be targeted as well. And the threat can come from anywhere. Connecticut and Illinois investigators, for example, determined that the Target hack resulted from credentials stolen from a third party, and the result for Target was an $18.5 million settlement negotiated by Connecticut Attorney General George Jepsen, among others.
Read More >5 Ways To Avoid a Phishing Attack
Before diving into the 5 ways to avoid a phishing attack, we want to make sure you understand what phishing means and the risk it presents.
Read More >Subscribe by email
Popular Articles
Post By Topics
- A Single Physical Server (1)
- About Us (6)
- Amazon (6)
- Apple (8)
- Backup Solutions (34)
- Biz Events (1)
- Cloud (2)
- Cloud Applications (14)
- Cloud Computing (24)
- Cognos (1)
- Computer Tips (33)
- Customer Video (2)
- Cyber Security Tips (19)
- Desktop Server (1)
- Desktop Virtualization (3)
- Disaster Recovery (20)
- Education (7)
- Fault Tolerance (2)
- Hackers (5)
- Healthcare (7)
- High Availability (5)
- IBM (1)
- Insurance (3)
- IT Effectiveness (43)
- IT Management Complexity (2)
- IT News (46)
- IT Projects (23)
- IT Support (39)
- IT Support Connecticut (43)
- IT Support CT (37)
- IT Tips (2)
- ITSupport (4)
- K-12 (9)
- LulzSec (1)
- Managed IT Services (14)
- Managed Print Services (7)
- Managed Service Provider CT (10)
- Managed Service Providers (20)
- Manufacturing (5)
- Mobile Security (1)
- Mobile World (11)
- MS Office 365 (2)
- MSP (11)
- Network (2)
- Network Downtime (4)
- Network Support CT (4)
- NewEgg (3)
- NSI (19)
- NSI TotalCare (1)
- Outcome-as-a-Service (1)
- PC Basics (12)
- Physical Server (1)
- Printers (9)
- Sales & Marketing Tip (1)
- Security (36)
- Security Features (6)
- Server OS (2)
- Small Business (26)
- Small Businesses (54)
- Smart Phone (15)
- Smartphone Security (4)
- SMB (33)
- Sonicwall (1)
- Streamline Management (1)
- Study (13)
- Totalcare (12)
- Upgrade (4)
- Using a Desktop PC as a Server (1)
- VDI (2)
- Virtualization (14)
- Virus (1)
- vMotion (5)
- VMware (10)
- VMware features (7)
- Xerox (6)