Category Archives: Continuing Education

Recognize Spam 3 Easy Ways

Of Course I Can Recognize Spam! Can’t everyone recognize spam? By definition spam is unsolicited bulk messages sent through email. “Great, I have a definition now, but how does that help me?” Unsolicited, in this case means you have not had any interaction with this company, brand, or person. In other words, someone got your email address […]

How MSP’s Protect Your Organization

We covered what a Managed Service Provider is in our last article.  Now it’s time to take a deeper look into how an MSP protects your organization. Let’s start with what your people notice the most, the PC at their desk and the software that runs on it.  Both hardware and software are in need of continual updates and […]

10 Brilliant Tips for Computer Security

Every day is a good day for computer security, but today is all about raising additional awareness about you and your computer’s security.  Let’s get right to it! #1  You are a target. You may not be a corporation, or have a lot of money, but you are still a target.  It might be a password, personal […]

Antivirus - How does it work?

How Antivirus Works

How Antivirus Works Antivirus software is a multi-layered security strategy that is easy to apply to your devices.  Antivirus runs in the background, happily defending you from malware and viruses as you go about your day.  So, how does it do that, exactly? Traditional Method Traditional antivirus products use a series of signature files.  Their […]

Ransomware- 10 Easy Steps To Keep Safe

First off, let’s explain what a cyber attacks and ransomware are.  They are any type of offensive maneuver that targets computers, networks, and infrastructures by various means of malicious acts designed to steal, alter, or destroy data or targeted systems.  Recently, ransomware has become the poster child for attacks.  It is designed to infect a pc […]

What is Spear Fishing

What is Spear Phishing? Spear Phishing is the practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information. Fancy words for a hacker sending an email to trick you into giving out your passwords or other information that could compromise your data, bank accounts, or […]