Progressive Computing, Inc.
  • Facebook
  • LinkedIn
  • RSS

Videos

IT Security Tip #46: Is my PCI compliance good enough to serve as a network cybersecurity audit?

We often get asked if an organization has passed their PCI compliance requirements for accepting credit cards; is there really a need for more security and compliance? The answer is yes! While the PCI architecture and requirements heavily overlap network ...

IT Security Tip #45: Is it time for cybersecurity planning?

The time to start planning for a security threat isn’t during a virus outbreak or immediately after you discover funds transferred within your banking accounts. Decisions and judgments made during this time are typically driven by emotion and not facts. ...

IT Security Tip #44: Should my computer be encrypted?

It’s another Tuesday in the airport, and you just cleared the TSA line and went to the pretzel shop for a quick bite before you catch your plane. You sit your laptop down to get a straw, and the next ...

IT Security Tip #43: New quarter, new password

It’s a wise idea to follow the calendar year when changing passwords to your online sites, financial/banking sites and computer systems. We recommend you change these passwords at least once every three months. It’s also important you don’t reuse passwords ...

IT Security Tip #42: Do you allow guests to access your WiFi network?

Do you have guest access on your company WiFi network? Or do you simply give out the same password that your employees use? If you give out your password, you’re practically opening the door for anyone to come in and ...

IT Security Tip #41: Do you enter your PIN when you use your debit card?

We live in a mostly cashless society these days. Our parents wouldn’t have ever thought to pay for a $1.50 cup of coffee with plastic; now it’s commonplace. How you swipe that plastic, though, makes a big difference in how ...

IT Security Tip #40: Basic cybersecurity training

Think fast: what’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince wanting to give you a sum of $34 million? Okay, you most likely didn’t reply to that…but the concept still ...

IT Security Tip #39: Is this request really from the boss?

A common scam going around requires everyone to be on their toes. Here’s the situation… An e-mail comes in from the boss asking you to e-mail a copy of employee pay stubs, tax information and files with confidential data such ...

IT Security Tip #38: Don’t just throw out that old computer

Getting rid of old computers or servers? Did you know that the components used in technology equipment are not landfill-safe? On top of the environmental hazards, unprotected e-waste typically contains a lot of confidential and private information in the form ...

IT Security Tip #37: Why is it so important to have unique passwords for all your online accounts?

A complex password is a necessity in the current age of cyberthreats, data breaches and other security incidents. Those of us who live in reality also know how hard it is to keep the seemingly hundreds of passwords straight, secure ...

Contact

Progressive Computing

Social Media

  • Facebook
  • LinkedIn
  • RSS