Blog Search


Searched Tag: security training

Your small business: target for a breach? No...

Small businesses make easy, lucrative targets for ransomware and malware that harvests Personally Identifiable Information (PII). Employee, customer and vendor data can provide cybercriminals with enough information for fraudulent activities, but there ar…
Maybe you think that as a small business, your risk of a data breach is low because larger companies are bigger targets and therefore more desirable to cybercriminals. Think ag…… https://customcomputer.me/blogs/your-small-business-breach-target

Remote Workforce - Tips for Employers

Enabling employees to work remotely can be offered as a perk, be a contingency plan or a bit of both. Technology provides many tools that simplify remote work, but plan your implementation to protect your business and maintain a sense of team.
The current Coronavirus pandemic is making it necessary for most to consider remote-enabling their workforce. Fortunately, technology makes this easier than ever, but that ease…… https://customcomputer.me/blogs/remote-workforce-tips-employers

Mobile Devices: Convenient and Useful, but Present Special Risks

Most of us use smart phones for business and our personal lives, and uses are growing. However, due to their size, rendering of content often obscures information that would more readily identify malicious content. Here are tips to make your use less pron…
Who doesn't have a smartphone? We conduct business from them, run our homes, shop, bank and track our health from them. How many have given up landline phones and only use thei…… https://customcomputer.me/blogs/mobile-devices-convenient-and-useful-present-special-risks

Keeping your data safe: Access Control

Protecting your data is achieved by a combination of practices. Are you covering all the bases?
Cyberattacks are commonplace today. Malware such as viruses, worms and more recently ransomware not only corrupt your data or hold it hostage, but also inflict irreversible damag…… https://customcomputer.me/blogs/keeping-your-data-safe-access-control

Think you are too small to be targeted by a cybercriminal? Think again.

Do you have a false sense of security? Small businesses actually make fairly lucrative targets and impacts on the small business can be more harmful than for larger ones.
When I meet with clients, especially SMBs, I often hear them say that they feel their business is too insignificant to be a target of cyber-criminals. Why would someone go after …… https://customcomputer.me/blogs/think-you-are-too-small-be-targeted-cybercriminal-think-again

HIPAA: A Quick Primer

What is HIPAA? HIPAA is the acronym for The Health Insurance Portability and Accountability Act of 1996.
You deal with HIPAA everytime you visit a medical office. But what is this law that seems to constantly appear anytime you get near a healthcare provider? HIPAA is the acronym fo…… https://customcomputer.me/blogs/hipaa-quick-primer

What does HIPAA require of you: A bird's eye view

So you know you are regulated by HIPAA. But in a broad sense, what must your organization do to be in compliance?
So you know you are regulated by HIPAA. But in a broad sense, what must your organization do to be in compliance? First and foremost, you need to understand what HIPAA and the …… https://customcomputer.me/blogs/what-does-hipaa-require-you-birds-eye-view

BYOD: Why is This Concept So Attractive to Employees?

BYOD, to work started as an occasional thing several years ago, but has quickly become a pervasive reality. To use your personal smartphone, tablet or laptop for work seems increasingly natural. Employees are embracing this concept without any serious res…
Bring Your Own Device, or BYOD, to work started as an occasional thing several years ago, but has quickly become a pervasive reality. To use your personal smartphone, tablet or…… https://customcomputer.me/blogs/byod-why-concept-so-attractive-employees