Non-Profits: The Cybersecurity Problem

Non-Profits: The Cybersecurity Problem

Non-profits have many of the same cybersecurity issues as for-profit companies. These potential threats are “invisible” yet need to be addressed. But, non-profits, whether houses of worship, trade organizations, advocacy organizations or...

read more
Canopy.us for child safety

Canopy.us for child safety

How do we protect our children online? This is a common question from parents. There are numerous solutions available but you must find the one that fits you. Some families use Google Family Link. This is a great solution if you are...

read more
DIY Cyber Risk Assessment

DIY Cyber Risk Assessment

This is the second of two articles on Risk Assessments. The first part asked the question, Do I Really Need To Do A Cybersecurity Risk Assessment? This article gives an introduction to conducting a Risk Assessment and helps explain the...

read more
Keeping the Lights On and the Packets Flowing

Keeping the Lights On and the Packets Flowing

Think about this possibility... It’s Monday morning. You’re dragging and you head to the coffee pot to get the first cup of the day. People are just starting to show up at the office. Then you hear a loud BOOM, the electricity goes off...

read more
Protecting Your Home and Business with DNS Filtering

Protecting Your Home and Business with DNS Filtering

There are many reasons to limit the types of websites that are accessible from your work or home network. A couple of the most common are (1) to keep inappropriate material from being accessed, and (2) protect from known websites that...

read more
Be Prepared for Bad Things to Happen!

Be Prepared for Bad Things to Happen!

An Introduction to Incident Response for SMBs Overview Every organization experiences cyberattacks and these are referred to as incidents. Incident almost always refers to something bad happening. Sometimes an incident results in a...

read more

Basics of Multi-Factor Authentication

Multi-factor authentication (sometimes called two-factor authentication or two-step authentication) provides an extra layer of protection for your online accounts. It is like having multiple locks of different types of the door to your...

read more
So You’ve Moved To The Cloud…Now What?

So You’ve Moved To The Cloud…Now What?

By this point, your business is probably already using the cloud for some pretty critical things. You're probably using Microsoft365 or Google Workspace for email, data storage and/or file sharing. You may also be using Box or Dropbox for...

read more