Videos

IT Security Tip #37: Why is it so important to have unique passwords for all your online accounts?

A complex password is a necessity in the current age of cyberthreats, data breaches and other security incidents. Those of us who live in reality also know how hard it is to keep the seemingly hundreds of passwords straight, secure ...

IT Security Tip #36: The long-forgotten piece of security for road warriors…

Do you connect to the office network or VPN (virtual private network) to get some work done in the evenings, on the weekends or when on the road? For many, the answer is yes. One of the most frequently forgotten ...

IT Security Tip #35: Your copier is spying on you…

Modern business equipment has radically changed how we conduct everyday business. Do you realize that copiers and multifunction printers are also one of the leading causes of data breaches? They are the one device on the network that commonly does ...

IT Security Tip #34: Don’t send your private information to anyone!

We’re seeing a new variant of an old scam. Here’s what happens: a secretary gets an e-mail from her boss – who is traveling – to please send him, as soon as possible, scanned copies of all the W2s the ...

IT Security Tip #33: Physical security matters!

In a recent incident reported in US news, an office secretary unknowingly gave some of her law firm’s most private data to a gentleman who had bought a Comcast Cable polo shirt off eBay. He dressed in khakis with a ...

IT Security Tip #32: Why do I need a $900 firewall AND pay a maintenance fee?

Routers and firewalls can be confusing – they essentially serve the same purpose of distributing Internet to devices on the network. A router like you’d purchase at a big-box store is designed to serve the needs of home, not the ...

IT Security Tip #31: Lie, lie, lie!

Social engineering is big business. What is it? Figuring out who you are and then using that information to make money off of it. People list password challenge and identity verification publicly or at least freely on their Instagram, Twitter ...

IT Security Tip #30: Start with a fresh session or browser window

You’d like to access the company website or a site for one of your vendors from work. When you click on your favorite browser, it opens to your homepage: msn.com, yahoo.com, aol.com, espn.com… You get the point. You then select ...

IT Security Tip #29: Keep sensitive data off employee equipment

If a laptop is stolen, even a strong password will likely get cracked. Once the thief succeeds, any private data that is unencrypted is free for the taking. One solution: keep sensitive data on a secure private cloud service, so ...

IT Security Tip #28: Change your name, and I don’t mean the last one

Too often we see e-mail usernames and prefixes the same across multiple free e-mail services. For example: jimmy67chevy@aol.com jimmy67chevy@gmail.com jimmy67chevy@yahoo.com jimmy67chevy@icloud.com This makes the work of hackers and cybercriminals way too easy. With the first part easy to figure out, ...

Contact

Progressive Computing