Non-Profits: The Cybersecurity Problem
Non-profits have many of the same cybersecurity issues as for-profit companies. These potential threats are “invisible” yet need to be addressed. But, non-profits, whether houses of worship, trade organizations, advocacy organizations or...
Canopy.us for child safety
How do we protect our children online? This is a common question from parents. There are numerous solutions available but you must find the one that fits you. Some families use Google Family Link. This is a great solution if you are...
DIY Cyber Risk Assessment
This is the second of two articles on Risk Assessments. The first part asked the question, Do I Really Need To Do A Cybersecurity Risk Assessment? This article gives an introduction to conducting a Risk Assessment and helps explain the...
Do I Really Need To Do A Cybersecurity Risk Assessment?
Of course you do! And let’s talk about why. So the real question becomes two — Why is this important? and How do you do this? Let’s work on answering the first question... Why is a cybersecurity risk assessment important for your...
Keeping the Lights On and the Packets Flowing
Think about this possibility... It’s Monday morning. You’re dragging and you head to the coffee pot to get the first cup of the day. People are just starting to show up at the office. Then you hear a loud BOOM, the electricity goes off...
Protecting Your Home and Business with DNS Filtering
There are many reasons to limit the types of websites that are accessible from your work or home network. A couple of the most common are (1) to keep inappropriate material from being accessed, and (2) protect from known websites that...
Be Prepared for Bad Things to Happen!
An Introduction to Incident Response for SMBs Overview Every organization experiences cyberattacks and these are referred to as incidents. Incident almost always refers to something bad happening. Sometimes an incident results in a...
Basics of Multi-Factor Authentication
Multi-factor authentication (sometimes called two-factor authentication or two-step authentication) provides an extra layer of protection for your online accounts. It is like having multiple locks of different types of the door to your...
So You’ve Moved To The Cloud…Now What?
By this point, your business is probably already using the cloud for some pretty critical things. You're probably using Microsoft365 or Google Workspace for email, data storage and/or file sharing. You may also be using Box or Dropbox for...