5 Security Blogs You Should Be Reading

Monday afternoon I sat in a security briefing full of IT professionals from around the city of Memphis. As the presenter discussed the topic at hand, it was obvious that many of the participants didn’t have any idea what was being discussed. The few questions posed told me that folks aren’t keeping up with what’s going on ...

Small Biz Tip: Browser Security for Chrome

Small Biz Tip: Browser Security for Chrome
Background Securing the online experience begins at the browser level. For many of us, the browser is so prevalent we treat it like a phone or TV, i.e., that is, we take it for granted and never stop and think about how it works. It is so entrenched in the operating system or the desktop; ...

28: Cloud Backup Services

28: Cloud Backup Services
If you aren’t backing up your data to an off-site location, YOU SHOULD BE! Cloud backup services are a great option for off-site backups. This week we tell you what to look for in a cloud service, and give you a couple of our favorite recommendations. Download Download episode transcript (PDF) Links Lessons Learned From ...

Lessons Learned From a Ransomware Attack

Lessons Learned From a Ransomware Attack
First I got a call. I was in “the zone” so I let it go to voice mail. Seconds later I got an email notification across my screen from the same customer. I knew someone was in a panic. Her voice-mail told me that something was screwy on the file server. They couldn’t open any ...

A Surprising Ransomware Statistic

Update (August 18, 2016). We just assisted a company with a ransomware attack. Check out our “Lessons Learned“. Security Magazine recently reported that 40% of businesses had experienced a ransomware attack in the last 12 months. Even worse is the fact that a third of those businesses lost revenue, and 20% experienced a complete business ...

An easy way to find hidden malware on your computer

An easy way to find hidden malware on your computer
Malware is coming at us from every direction these days. No longer can you just install system patches and an antivirus or anti-malware application and expect to be protected. All of the above is indeed following best practices, but these methods of protection do not address everything, such as zero-day exploits. These exploits are so ...

How to disable Microsoft Office Macros

How to disable Microsoft Office Macros
When macros became available for Office, most of us were excited because it added automation and power to the suite of products. But it soon became apparent that the misuse of macros and the associated power would be problematic. In fact today this is one of the favorite methods hackers use to compromise systems with their malware ...

27: Lock Up Your Thumb Drive

27: Lock Up Your Thumb Drive
This is episode 4 of our 4 part series on everyday encryption in your business. Today we tackle why, and how, you would encrypt your USB thumb drive with VeraCrypt. Download Download episode transcript (PDF) Links eSecurity tutorial using VeraCrypt to encrypt a thumb drive. DISCLAIMER: We have no connection to this site or its ...

26: Lock Up Your Email

26: Lock Up Your Email
We’re back! After a summer sabbatical, the podcast is back, with part 3 of a 4 part series on encryption in your small business. This week: what to know about email encryption: important terms, compliance, and tips for encrypting the important stuff. Download Download episode transcript (PDF) Links Episode 25 of the Tech Tip Podcast ...

25: Lock Up Your Docs

25: Lock Up Your Docs
Do you keep sensitive information in Microsoft Word, Excel or PowerPoint docs? What about Adobe PDFs or AutoCAD files? If so, then you probably need to encrypt those documents. This week we’ll talk about when you should consider encryption for your documents, and cover some tools and techniques for easily and cheaply encrypting your files. ...