Cybersecurity

You need to take cyber security seriously; Why you shouldn’t do it alone.

0:01 So today I want to go over the comparison of proactive versus reactive when it comes to your cyber security outlook. 0:11 While it might seem cost effective to wait until a problem arises, the potential damage from a cyber attack or data breach can be devastating, both financially and reputationally, if you are …

You need to take cyber security seriously; Why you shouldn’t do it alone. Read More »

Ten Ways to Protect yourself and your Devices

Our portable devices have evolved into veritable data vaults as an outcome of our increasingly connected and digital lives. As a result, they’re easy prey for cybercriminals. Here are some tips to protect yourself and your technology. 1. Upgrade your software routinely. Keeping all of your devices up-to-date is the first line of defense against …

Ten Ways to Protect yourself and your Devices Read More »

IP addressing: Public and Private

The importance of Public and Private IP Addresses – Unearthing the 192.168

When it comes to IP addresses on your network, you are most likely to come across two phrases: public and private.   To begin, let us define what an IP address is. IP addresses are numeric network identifiers that identify your device, much like your street address. The router or gateway DHCP service—the addressing service—assigns …

The importance of Public and Private IP Addresses – Unearthing the 192.168 Read More »

Think your email has been compromised? Do this.

Emails get compromised all the time. Most commonly from Phishing scams, where credentials get typed into a non-legitimate website. The two signs of compromise are: You are missing emails people say they sent you Contacts report strange emails from you Though this isn’t definitive, as these things can happen even without you being compromised. Missing …

Think your email has been compromised? Do this. Read More »

Authorized Reseller