Cybersecurity

Latest Posts from Our Blog

Windows 10 End of Life

Windows 10 End of Life (EOL) is October 14, 2025 – How can I prepare?

By Jeff Fowler | June 23, 2021
Categories: , , ,

Rumors surrounding “Windows 11” have been passed around for months now, and until recently, no one believed it. Now that we have an actual date from Microsoft, we can safely assume that Microsoft is ready to move forward into the next generation of the Windows Operating System. They have stamped an official date on the…

Read More
Protecting Data

Guide to PCI DSS – Part 3: Protecting Data

By Justin Oliver | June 21, 2021
Categories: ,

Welcome to SandStorm IT’s 6-part series about Payment Card Industry Data Security Standard (PCI DSS). In this series, we’ll cover what PCI DSS is and the various requirements: Part 1 – What is PCI DSS? Part 2 – Building and Maintaining a Secure Network Part 3 – Protecting Data (You are here) Part 4 –…

Read More
Browser Cookies

What exactly are “Browser Cookies”?

By SandStorm IT | June 8, 2021
Categories: , , , ,

A browser cookie is data sent from a website that will be stored on your computer. Typically, these cookies store data such as cart information on shopping websites, login information when you choose to “Remember Me” while logging in to a website, tracking activity across websites, storing customized settings for websites, and potentially other data…

Read More
What is Incognito mode

What is “Incognito mode” in Google Chrome and Why would you use it?

By SandStorm IT | June 2, 2021
Categories: , , ,

What is Incognito Mode? Incognito mode is essentially a setting on your web browser to disallow the storing of local data relating to the websites you surf. When surfing the web in this mode, your browsing history will not be recorded. Also, any additional cookies sent to your browser during this time will not be…

Read More
Hardware/Uptime Monitoring

What is Hardware/Uptime Monitoring?

By Robert Cleveland | April 20, 2021
Categories: , , ,

Hardware monitoring is a feature of the motherboard, sometimes as a separate chip on the motherboard, that monitors different aspects of the system. for potential issues. It can measure variables such as the output voltage of the power supply, the speed of the fans that are connected directly to the motherboard header, and the internal…

Read More
most common cyber-attack

Why is phishing still the most common cyber-attack?

By Josh Yarbrough | March 30, 2021
Categories: , , ,

What is phishing? Phishing.org defines phishing as “A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.” This is a very common and…

Read More
Make Your Wi-Fi More Secure

5 Things You Can Do To Make Your Wi-Fi More Secure

By SandStorm IT | March 23, 2021
Categories: , , , , ,

2021Why is Wi-Fi security so important? Wi-Fi is a point of entry that attackers can use to gain access to your network without ever being physically inside your building. In this post, we’ll be going over a few things you can do to lock down your Wi-Fi for a more secure network. The best part…

Read More
Office 365 Phishing Attacks

Office 365 Phishing Attacks On the Rise

By Justin Oliver | March 2, 2021
Categories: ,

Recently, we have seen a dramatic increase in the amount of phishing cyber-attacks aimed at Office 365 users.  It’s so bad that almost three quarters (71.4 percent) of corporate Office 365 users have at least one compromised account each month, according to a report by Skyhigh Networks.  If you are not taking Office 365 security…

Read More
Protecting Data

Guide to PCI DSS – Part 2: Building and Maintaining a Secure Network

By Justin Oliver | February 23, 2021
Categories: ,

Welcome to SandStorm IT’s 6-part series about Payment Card Industry Data Security Standard (PCI DSS). In this series, we’ll cover what PCI DSS is and the various requirements: Part 1 – What is PCI DSS? Part 2- Building and Maintaining a Secure Network (You are here) Part 3 – Protecting Data Part 4 – Further…

Read More
Common Browser-based Network Attacks

Common Browser-based Network Attacks and How to Avoid Them

By Jordan Sanders | February 16, 2021
Categories: , , ,

Day by day, we do more and more through our web browsers.  We perform daily work tasks like checking and sending email, visiting websites to learn about news in our chosen fields, and work in web-based operational systems all through our browsers, and outside of the office, we use those same browsers to check our…

Read More

Connect w/ Us:

Subscription