Keep Employees Happy With the Latest Tech

A Global Study recently revealed that the employee satisfaction gap in small-business is linked to poor tech provisioning – and this could be resolved with a more forward-looking perspective when deciding which equipment will be purchased for the future of work. This internal study reveals pertinent statistics to help you make the most informed decisions […]

Read More

Tax Identity Theft Awareness Week

‘Tis the season when the tidings come in envelopes stamped “Important Tax Return Document Enclosed.” Yes, it’s tax filing season, and the season’s Grinches are the tax identity thieves and government imposters who are hoping to steal your money.  Tax Identity Theft Awareness Week is February 3-7. The Federal Trade Commission (FTC) Tax Identity Theft […]

Read More

This week’s video topic: Two-Factor Authentication

In today’s cyber landscape, having just one strong password on an account just isn’t enough. While we can do a lot to improve the strength of our passwords, having Two-Factor Authentication (2FA) is critical to take that security to the next level. In this week’s security tip video, learn about what Two-Factor Authentication truly is […]

Read More

The Internet Crime Complaint Center Issues Alert on Employment Scams

The Internet Crime Complaint Center (IC3) has issued an alert warning consumers of fake jobs and hiring scams targeting applicants’ personally identifiable information (PII). Cyber criminals posing as legitimate employers spoof company websites and post fake job openings to lure victims. Cyber criminals will conduct fake interviews and even offer positions to victims before requesting […]

Read More

The end of Windows 7 and recommendations to best protect your data

1/14/2020 As you know Windows 7 and Server 2008 R2 have now reached their end-of-life. This means after 12 years in production, Microsoft will no longer update or support the operating system. As of today NetMarketShare estimates Windows 7 is still about 26% of the market. So, if you have not upgraded yet you are […]

Read More

This week’s topic: Use Caution with USB Drives

This week’s topic: Use Caution with USB Drives USB Drives are a great way to store and transfer data quickly and easily between devices. Unfortunately, many of their benefits create some major security concerns we all should be aware of. In this week’s security tip, learn some of the security risks associates with USB drives […]

Read More

This week’s topic: Social Media Quizzes

Social media sites can be a great way of sharing photos, comments and connecting with friends and family, but certain seemingly innocent surveys can put some sensitive data into the hands of a cyber criminal. In this week’s security tip, learn about some of these scams and how you can utilize social media sites safely. […]

Read More

Secure New Internet-Connected Devices

Secure New Internet-Connected Devices: During the holidays, internet-connected devices—also known as Internet of Things (IoT) devices—are popular gifts. These include smart cameras, smart TVs, watches, toys, phones, and tablets. Although this technology provides added convenience to our lives, it often requires that we share personal and financial information over the internet. The security of this […]

Read More

The Art of the Con

This month’s topic:  The Art of the Con While the technical side of cybersecurity, such as firewalls and threat detection services, helps contain various attacks, it’s the human side that poses the most risk. Social engineers know how to manipulate emotions and use them against the victim. Cons and scams work because humans will always have […]

Read More

For Tax Professionals – Tax Security 2.0 Checklist

From the IRS All tax professionals should take stock of security measures used to protect client data. Tax practitioners remain high-value targets of cyber-criminals seeking to steal sensitive tax information, so they can file fraudulent returns. Whether a one-person shop or partner in a large firm, everyone should take steps to protect their clients and […]

Read More