Cybersecurity

Latest Posts from Our Blog

best ways to combat computer infections

What are the best ways to combat computer infections?

By Matt Ballard | January 20, 2020
Categories: , , , , , ,

The best way to combat computer infections is to NEVER connect to the internet. Of course, this is not a desired or viable option for most people. But unfortunately, the internet is the most common way of receiving or transmitting infections. Luckily, a mix of the right software and knowledge can go a long way…

Read More
Intrusion Detection and Prevention Systems

What are Intrusion Detection and Prevention Systems?

By SandStorm IT | January 6, 2020
Categories: , , ,

You may not be aware of Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) as they relate to Information Technology (IT), but the concept is simple enough – an IPS is like the lock on your front door, it keeps people from being able to simply walk in and go through all of your…

Read More
HTTPS

Why is HTTPS so important?

By Josh Yarbrough | December 30, 2019
Categories: , , ,

So everyone’s seen the HTTP and HTTPS prefixes on their favorite website addresses but did you ever wonder why they were there and what the difference between the two was? Keep reading to find out. Way back in the pioneering days of the internet, the gurus of old had to figure out a way for…

Read More
Data Breaches

Data Breaches – What you need to know

By Justin Oliver | November 25, 2019
Categories: ,

Data breaches have been the subject of many news stories lately. Large companies like Target, Home Depot and even Equifax have been hit, exposing millions of pieces of our personal information. It’s only normal to ask, “How do I protect my personal data?” Remember that most identity thieves are not targeting you in particular, they want…

Read More
Data Breach

Data Breach: Macy’s customer data stolen after its online store was hacked

By Jeff Fowler | November 21, 2019
Categories: , , ,

According to Macy’s, their e-commerce website was breached in October. Hackers managed to steal information from unknowing customers as they shopped online. Overall, it’s a very scary situation that proves that data breaches can happen to anyone. Last year, online tech store Newegg was hit with a data breach that skimmed the payments page for…

Read More
Social Engineering

Social Engineering: How to keep your business safe

By Jeff Fowler | November 18, 2019
Categories: , ,

What is social engineering? Social engineering involves manipulating users to give confidential information to people who should not have access to it. Common targets include banking and credit card info, passwords, social media access & computer access. The reason they resort to social engineering is that it’s much easier to trick a human than to…

Read More
employee phishing

Don’t Get Phished!

By Doyle Sanders | October 7, 2019
Categories: , , ,

There has been a lot of local news and buzz lately about phishing activities and not the ones where you catch dinner! Emails, websites, and even telephone calls can be phishing expeditions by the less than trustworthy.  We’ve all heard of folks hit by identity theft.  And, yes, sometimes that comes from hackers and the…

Read More
TWO FACTOR AUTHENTICATION

What is Two Factor Authentication?

By SandStorm IT | September 30, 2019
Categories: , ,

Two Factor Authentication, commonly abbreviated 2FA, is a second layer of authentication in addition to your password used to keep your accounts safe. Typically, a code is sent to your phone (by text or application) every time you sign into your account. You enter this code after you receive it to finish the login process.…

Read More
Windows Defender good enough

Security Alert – Microsoft warns of vulnerabilities in Internet Explorer and Windows Defender

By Jeff Fowler | September 24, 2019
Categories: , , , , ,

Microsoft is urging users of Windows 10 to update immediately. The flaw lies in Internet Explorer and allows an attacker to potentially install software, modify/view/delete data or even create new accounts. The vulnerability was found by a security engineer with Google’s Threat Analysis Group. The update is for Windows 10, Windows 8.1, Windows 7, Windows…

Read More
Is Biometric actually more secure?

Is Biometric actually more secure?

By Jeff Fowler | September 9, 2019
Categories: , ,

With the latest in face recognition and other biometric technology coming to the consumer level, biometric security may begin to cross your mind. You may wonder “Is biometric actually more secure?”  The short answer is that it’s stronger than using a weak password, but not as strong as using a strong password. For more info…

Read More

Connect w/ Us:

Subscription