Cybersecurity

Latest Posts from Our Blog

The Perils of Reusing Passwords: Protecting Your Digital Fortress

By Jeff Fowler | August 1, 2023
Categories: ,

In today’s digital age, passwords serve as the frontline defense for our online identities and sensitive information. However, despite the numerous data breaches and hacking incidents, many individuals still underestimate the importance of unique and strong passwords. One common yet perilous practice is password reuse, which involves using the same password across multiple accounts. In…

Read More
What are Managed IT Services?

What are Managed IT Services?

By Justin Oliver | July 18, 2023
Categories: , , , , , , ,

What are Managed IT Services? The Technology Services Industry Association (TSIA) defines managed services as “the practice of outsourcing day-to-day technology management responsibilities to a third party as a strategic method for improving operations and accelerating a return on their technology investment”, typically for a fixed price. It is the proactive monitoring of computer and…

Read More
Cybersecurity Awareness

What is Cybersecurity Awareness and How does it affect my business?

By SandStorm IT | July 10, 2023
Categories: ,

As a busy parent, professional or retiree, we all take security seriously in some respects. How many of us leave our homes without closing or locking the door? How many of us leave our keys in the car when visiting a restaurant? I suspect the number of people who take such a relaxed approach to…

Read More
Managed Anti-Virus/Anti-Malware

Why is Patch Management Important For Cyber Security?

By SandStorm IT | May 23, 2023
Categories: , , , ,

Before we jump into why patch management is important, we should define what patches are and what patch management is. What are patches? Patches are software code fixes that repair broken functionality, add new functionality, or fixes security holes in software.  Patches have been around a long time.  You’ve likely been patching Windows workstations going…

Read More
What is a VPN?

What is a VPN?

By SandStorm IT | May 9, 2023
Categories: , ,

A virtual private network (VPN) allows a private network of devices to be securely extended over a public network such as the Internet. This gives the  functionality of a typical private network but with the convenience of a public network. VPNs are commonly seen in the corporate world, where having easy, secure access to the…

Read More
Data Encryption

What you need to know about Data Encryption?

By SandStorm IT | April 25, 2023
Categories: , ,

You may have come across the word encryption recently in the news. It’s becoming a bit of a hot topic in the media as more and more eyes shift to covering the ever expanding world of computer crime. Governments are focusing on it to try and gain the ability to decrypt files when necessary, and…

Read More

The EPA is taking action on Cybersecurity for Public Water Systems, is your IT up to the task?

By Jeff Fowler | April 20, 2023
Categories: , , , ,

As the world becomes increasingly reliant on technology, the importance of cybersecurity grows. The U.S. Environmental Protection Agency (EPA) is taking action on cybersecurity for public water systems, making it essential for IT departments to ensure their infrastructure and systems are secure. Cybersecurity is a significant concern for all businesses, but especially for those in…

Read More
What are social media bots

What are social media bots and how can I protect myself?

By SandStorm IT | March 21, 2023
Categories: , , ,

Chances are, if you have used any popular social media platforms recently, you have been exposed to social media bots.  By definition, this is not necessarily a bad thing, since these bots are just accounts on social media which are run automatically by a computer program rather than a human.  However, most benign bots are…

Read More
Intrusion Detection and Prevention Systems

What are Intrusion Detection and Prevention Systems?

By SandStorm IT | March 14, 2023
Categories: , , ,

You may not be aware of Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) as they relate to Information Technology (IT), but the concept is simple enough – an IPS is like the lock on your front door, it keeps people from being able to simply walk in and go through all of your…

Read More
best ways to combat computer infections

What are the best ways to combat computer infections?

By Matt Ballard | February 28, 2023
Categories: , , , , , ,

The best way to combat computer infections is to NEVER connect to the internet. Of course, this is not a desired or viable option for most people. But unfortunately, the internet is the most common way of receiving or transmitting infections. Luckily, a mix of the right software and knowledge can go a long way…

Read More

Connect w/ Us:

Subscribe to Our Newsletter