by petratechit | Apr 1, 2022 | Tips and Tricks, Videos
One of the first things you can do when going into business (and consequently, #1 on our Cybersecurity Essentials Checklist) is to create an internal privacy policy. As the name suggests, the internal privacy policy is a written document to be shared with all...
by petratechit | Mar 25, 2022 | Cybersecurity, Videos
Every good information security program is based on three essential principles: confidentiality, integrity, and availability. One of the most common-sense security methods an organization can use to fulfill these principles is the concept of “least...
by petratechit | Mar 18, 2022 | Cybersecurity, Managed IT, Tips and Tricks, Videos
When you begin using cloud applications, it is easy to get excited and immediately begin using the application for your business. However, it is imperative to set up the existing security features to monitor and track suspicious activity. Chris goes over the top 3...
by petratechit | Mar 11, 2022 | Managed IT, Software Updates, Videos
Does your business have a patch management plan? If you answered “no” you’re not alone. Most workplaces leave it up to fate, rely on built-in failsafe features (like when your computer automatically turns off and updates), or just let employees...
by petratechit | Mar 4, 2022 | Cybersecurity, In The News, Videos
As the world watches and reacts to Russia’s invasion of Ukraine, a top concern is cyber warfare and cybersecurity on a global scale. Chris breaks down a timeline of key events that you should be aware of and how they might affect your business or organization....
by petratechit | Feb 25, 2022 | Cybersecurity, Managed IT, Videos
When it comes to cybersecurity, it is not an exaggeration to say that a simple user error can open a gateway for a cyber attack on your business or organization. For example, an employee could click the wrong link, download “free” software, or disable a...
by petratechit | Feb 24, 2022 | Uncategorized
Researchers from Fortinet are warning of a new threat to be on the lookout for. Right now, NFTs are all the rage. Everyone is talking about them, and many are excited about them. Hackers have been quick to take advantage of that fact, and the Fortinet researchers...
by petratechit | Feb 23, 2022 | Cybercrime, Network Security, Videos
When it comes to the Internet of Things (IoT) you must be careful to consider the pros and cons. While it can be convenient to control your home’s temperature or alarm system through an app, you have to consider the security of that network connection. The...
by petratechit | Feb 23, 2022 | Uncategorized
Researchers at Avanan are a Check Point subsidiary. They have recently issued a warning that anyone who uses Microsoft Teams should be aware of. According to the latest statistics, more than 270 million people use Teams every single month. According to Avanan, hackers...
by petratechit | Feb 22, 2022 | Uncategorized
For most of the history of the internet Linux has been able to stay below the radar of hackers around the world. While there have been some attacks that specifically targeted Linux users, they’ve managed to keep a low enough profile that it hasn’t been a...