IT Security

How to create a strong password and remember it.

A strong password is usually 10-18 characters long, upper and lower case, with numbers and symbols. Unless the password is something that can be easily guessed like, “Ilovemycat!1”, it can take years for a hacker to crack the code. A good, strong password should be complex, but not too complex that you forget it. In…

Read More »

The newest cybersecurity threat? Deepfakes.

              Never seen a Deepfake before? Watch this video first.   Without knowing what a Deepfake is you might think that Tom Holland and Robert Downey Jr acted out a scene from Back to the Future. The truth is neither of these actors got together to recreate this scene….

Read More »

Digital Distancing 101

During the times of COVID-19, social distancing is not the only thing we need to worry about. With many people working from home, cyber crimes have been increasing during the pandemic. In order to stay safe from hackers, you’ll have to practice digital distancing. Digital Distancing is cutting down the number of devices, networks, and…

Read More »

Past Live Events

Joe and Chad give a live demonstration of Microsoft Teams. They show viewers how Teams works and all the possibilities that come with it. To attend our upcoming live events click here.  Our CEO, Joe Svoboda, and our Development Manager, Chad Miller give a presentation on technology and working from home. They discuss topics such…

Read More »

COVID-19 Cybersecurity Alert

Even a worldwide pandemic can’t put a stop to cybercriminals who take advantage of vulnerable people and businesses. As if the world needs another problem, there has been an increase in COVID-19 related cybercrimes. Please read the following so that you are aware of the situation and can prevent it from happening to you. The…

Read More »

IT Security Guidelines for Remote Work

Many business continuity plans have been challenged in the wake of the 2020 COVID-19 outbreak. Companies across the globe are trying to figure out how to work remotely while also staying productive and maintain IT security. Whether your company has 5 or 5,000 employees, it’s important that everyone takes the correct preventative security measures in…

Read More »

January 28 is Data Privacy Day

What is Data Privacy Day? There is a day for everything.  Did you know that January 22 is National Answer Your Cat’s Questions Day?  Yeah, most are pretty meaningless, but not today. Data Privacy Day is actually an international effort that stems back to 1981 with the signing of the Convention 108, the first legally…

Read More »

Office 365 & Ransomware: The Lurking Threat

For small to midsized businesses, Microsoft Windows-based systems remain dominant. Windows continues to be the operating system most widely used on desktops and laptops. And Microsoft Office remains the most widely used work office suite. So it’s no surprise that Windows systems remain the top target for ransomware, too. A stunning 100% of IT professionals…

Read More »

What is DNS Protection and why is it important?

DNS protection provides an additional layer of protection between an employee and the internet by blacklisting dangerous sites and filtering out unwanted content. By using secure DNS servers both at home and at work, employees can avoid unnecessary risks and the potential for malicious attacks. Here’s everything you need to know about the benefits of…

Read More »

Municipalities and Small Businesses Take Notice: Cybercriminals are After You

Two municipalities were hit by ransomware last month and forced to pay approximately $600,000 each to regain access to city email and computer systems. One city, Riviera Beach, Florida, has roughly the same size population as the Kirkwood-Des Peres area where our offices are located. For three weeks, Riviera Beach’s email and computer systems were…

Read More »

Start using two factor authentication – like yesterday

Two-factor authentication is an authentication mechanism to double check that your identity is legitimate. Not a week goes by that we don’t receive a frantic phone call from someone with a compromised account. A bad actor has cracked their email password and sent out thousands of spam emails. Each one of these phone calls could have been avoid if they would have enabled two-factor authentication for their account.

Read More »

Bomb threats shutting down business via email

If you are like me, one of the first things you do when you sit down at your desk each morning is sift through your new email.  Let’s say you come across the following email : My man carried a bomb (Hexogen) into the building where your company is located. It is constructed under my…

Read More »

Newest Sextortion Email Scam A Growing Problem

It’s a new twist on an old email scam that is proving to catch some people off-guard. The recipient receives an email from an attacker who claims to have hacked your computer and webcam in order to make a video of you while watching porn. The hacker threatens to release the video to all of…

Read More »