Cybersecurity

Latest Posts from Our Blog

What are social media bots

What are social media bots and how can I protect myself?

By SandStorm IT | March 21, 2023
Categories: , , ,

Chances are, if you have used any popular social media platforms recently, you have been exposed to social media bots.  By definition, this is not necessarily a bad thing, since these bots are just accounts on social media which are run automatically by a computer program rather than a human.  However, most benign bots are…

Read More
Intrusion Detection and Prevention Systems

What are Intrusion Detection and Prevention Systems?

By SandStorm IT | March 14, 2023
Categories: , , ,

You may not be aware of Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) as they relate to Information Technology (IT), but the concept is simple enough – an IPS is like the lock on your front door, it keeps people from being able to simply walk in and go through all of your…

Read More
best ways to combat computer infections

What are the best ways to combat computer infections?

By Matt Ballard | February 28, 2023
Categories: , , , , , ,

The best way to combat computer infections is to NEVER connect to the internet. Of course, this is not a desired or viable option for most people. But unfortunately, the internet is the most common way of receiving or transmitting infections. Luckily, a mix of the right software and knowledge can go a long way…

Read More
HTTPS

Why is HTTPS so important?

By Josh Yarbrough | February 21, 2023
Categories: , , ,

So everyone’s seen the HTTP and HTTPS prefixes on their favorite website addresses but did you ever wonder why they were there and what the difference between the two was? Keep reading to find out. Way back in the pioneering days of the internet, the gurus of old had to figure out a way for…

Read More
What are Managed IT Services?

5 Ways Managed IT Service Providers Keep Your Business Secure

By Jeff Fowler | January 17, 2023
Categories: , ,

As a business owner, you have a lot on your plate. You’re responsible for running your company, as well as its long-term success. Managed IT Service Providers specialize in keeping your business’s IT infrastructure secure and reliable, so you don’t have to. They proactively monitor your systems for potential threats and vulnerabilities, and they have…

Read More
Data Breaches

Data Breaches – What you need to know

By Justin Oliver | January 10, 2023
Categories: ,

Data breaches have been the subject of many news stories lately. Large companies like Target, Home Depot and even Equifax have been hit, exposing millions of pieces of our personal information. It’s only normal to ask, “How do I protect my personal data?” Remember that most identity thieves are not targeting you in particular, they want…

Read More
HOW TO AVOID PHISHING SCAMS

Phishing: How to Avoid Phishing Scams

By SandStorm IT | January 3, 2023
Categories: , ,

What is Phishing? This varies from the specific type of phishing, but in general, phishing is the act of tricking and manipulating a user to reveal information to the attacker through various means. Tools of the trade can range from malware laced documents, to websites with URLs that are spelled similarly to popular services that…

Read More
Social Engineering

Social Engineering: How to keep your business safe

By Jeff Fowler | December 13, 2022
Categories: , ,

What is social engineering? Social engineering involves manipulating users to give confidential information to people who should not have access to it. Common targets include banking and credit card info, passwords, social media access & computer access. The reason they resort to social engineering is that it’s much easier to trick a human than to…

Read More
find hidden programs

How can I find hidden programs running in the background?

By Matt Ballard | December 5, 2022
Categories: , , , , ,

There are programs and utilities that run in the background of every computer. Some of these programs are necessary for your system to function. Others may be malware, adware, or malicious programs designed to hijack your computer or personal information. Let’s discuss some ways to access these hidden background programs: Windows Task Manager Most people…

Read More
employee phishing

Don’t Get Phished!

By Doyle Sanders | November 29, 2022
Categories: , , ,

There has been a lot of local news and buzz lately about phishing activities and not the ones where you catch dinner! Emails, websites, and even telephone calls can be phishing expeditions by the less than trustworthy.  We’ve all heard of folks hit by identity theft.  And, yes, sometimes that comes from hackers and the…

Read More

Connect w/ Us:

Subscribe to Our Newsletter