What would you do if your business suffered a ransomware attack tomorrow? Do you have a contingency plan in case of a tornado, hurricane, or earthquake? The unexpected can happen anytime, and small businesses can get hit particularly hard. Small businesses are the
Learn How Microsoft 365 Copilot Is Going to Transform M365 Apps
Advanced AI is a new buzzword in cloud computing. The launch of tools like ChatGPT and Bard have made big waves. Developers are now racing to introduce the next level of features to apps. Features that do part of your work for you.
7 Customer-Facing Technologies to Give You an Advantage
Customers look for convenience. In today’s world that means technology that makes their life easier. From webforms to POS systems, you need to keep the customer experience in mind in all you do.When people aren’t happy with their experience interacting with a company,
6 Things You Should Do to Handle Data Privacy Updates
Once data began going digital, authorities realized a need to protect it. Thus, the creation of data privacy rules and regulations to address cyber threats. Many organizations have one or more data privacy policies they need to meet.Those in the U.S. healthcare industry
Zážeh podcast with Martin Hurych – security for laymen
Before the holidays I was a guest on Martin Hurych's podcast Zážeh. Martin called it "IT security for the layman". The full transcript of the interview, including the video, is available from Martin on the web or you can find it in his
👨💻 Personal Cyber Security CHECKLIST 👨💻 – fifth and final episode
For the most lazy existences that don't want to do almost anything 5 tips to ensure your safe survival on the internet (not just during the holidays) I turn on multi-factor authentication wherever I can. Where I can't, I'll use a unique password
❌ Don’t get ripped off ❌
"Soul engineering in practice"It's a carbon copy. Over and over again. First the solution and next time we'll have the whole story for those who like to read. It's really not normal when someone wants you to download something to your PC, mobile
👨💻 Personal Cyber Security CHECKLIST 👨💻 – part four
Topic: Safe EmailIt is extremely important to protect your email account. Why? If you haven't turned on multi-factor authentication (MFA), an attacker can access other online accounts or reset passwords through a "hacked" email ... (and you won't even know it, the attacker
👨💻 Personal Cyber Security CHECKLIST 👨💻 – THIRD part
Your cell phone and security?Set a PIN lock, ideally more than 4 characters, i.e. 6 characters. You can substitute a fingerprint, some prefer FACE ID (every man's opinion on whether it's secure enough)Set an automatic lock on negativity.Avoid PIN's like: your year of
👨💻 Personal Cyber Security CHECKLIST 👨💻 – PART TWO
Authentication (User Identity Verification) & Passwords And here we have the continuation of the checklist. A few of you have gotten back to me with more tips, thanks! I'll add them gradually and then publish them as a comprehensive e-book. If we get
👨💻 Personal Cyber Security CHECKLIST 👨💻 – part one
Topic - Safe web browsing: We have prepared a "series to continue". We will focus on one topic each time. No theory, just tips, tricks & tutorials and tools that I use myself. Most of these will be opensource. Don't store passwords in
Page [tcb_pagination_current_page] of [tcb_pagination_total_pages]