WorkSmart Blog | Helping You Simplify IT

Archive for cybersecurity

Wait, the new password guidelines are simpler?

The National Institute of Standards and Technology (NIST) recently updated their Digital Identity Standards. I bet you haven’t read them, but the NIST guidelines affect how sites and apps create[...]

Read More

Top Five IT Security Risks: Lack of Security Patching

 

Read More

The Top Five IT Security Risks: Threat One, End Users

Hello readers, We'd like to introduce you to our guest blogger - Shawn Pate, Senior Technical Advisor. He's been a part of the WorkSmart team for over 6 years, and he is an absolute expert in IT[...]

Read More

One Phish, Two Phish, Oops Phish...

Cyber-security is getting tougher every day. Hackers are smarter. Technology is advancing faster. And the losses businesses experience as a result of cyber-crime are astronomical. A quick Google[...]

Read More

Is two-step authentication the only way?

With all the recent hacking scares all over the world, you know and understand that your cyber security and your business’s cyber security are extremely important. However, when it comes to[...]

Read More

Cyber-crime and social engineering

For as long as there have been cybercriminals, there have been social engineers, or people who use tricks and scams to force other people to volunteer sensitive information. There are several ways to[...]

Read More

9 cybersecurity terms everyone must know

Everyone, from doctors to lawyers, needs to continue learning to stay ahead of the times. Business owners might have it worst of all, oftentimes needing to stay on top of several industries to keep[...]

Read More

Don’t let hackers fool you with these tricks

According to several reports, the volume of malicious cyber attacks have increased since the beginning of the Rio Olympics. And even though our devices have the latest network security systems,[...]

Read More

Free decryption tools fight ransomware

Similar to the shakedowns you see in mob movies where innocent shop owners are forced to pay “protection money,” deploying ransomware is a means of extortion. Computer hackers install it on your[...]

Read More

5 security measures made easy

Let’s face it, keeping yourself free from online threats can be a pain: using different passwords for every site, changing them every three months, using advanced encryption, the list goes on and on.[...]

Read More
« < 1 ...
3 4 5 6 7
... 9 > »