by dlstrom-sds | Jul 17, 2023 | resources
There are many reasons to limit the types of websites that are accessible from your work or home network. A couple of the most common are (1) to keep inappropriate material from being accessed, and (2) protect from known websites that serve malicious software or host...
by dlstrom-sds | Jun 13, 2023 | resources
An Introduction to Incident Response for SMBs Overview Every organization experiences cyberattacks and these are referred to as incidents. Incident almost always refers to something bad happening. Sometimes an incident results in a security breach. Breach is usually...
by dlstrom-sds | May 9, 2023 | resources
Multi-factor authentication (sometimes called two-factor authentication or two-step authentication) provides an extra layer of protection for your online accounts. It is like having multiple locks of different types of the door to your house. Usually we have a lock...
by dlstrom-sds | Apr 11, 2023 | resources
By this point, your business is probably already using the cloud for some pretty critical things. You’re probably using Microsoft365 or Google Workspace for email, data storage and/or file sharing. You may also be using Box or Dropbox for storage and file...
by dlstrom-sds | Mar 4, 2023 | resources
Every business owner or leader needs to take steps to protect their organization from potential cybersecurity threats. Business leaders know their business but often do not know where to start with identifying where to start their cybersecurity journey. Here’s a...
Recent Comments