Blog Search


Searched Tag: multi-factor authentication

Your small business: target for a breach? No...

Small businesses make easy, lucrative targets for ransomware and malware that harvests Personally Identifiable Information (PII). Employee, customer and vendor data can provide cybercriminals with enough information for fraudulent activities, but there ar…
Maybe you think that as a small business, your risk of a data breach is low because larger companies are bigger targets and therefore more desirable to cybercriminals. Think ag…… https://customcomputer.me/blogs/your-small-business-breach-target

Mobile Devices: Convenient and Useful, but Present Special Risks

Most of us use smart phones for business and our personal lives, and uses are growing. However, due to their size, rendering of content often obscures information that would more readily identify malicious content. Here are tips to make your use less pron…
Who doesn't have a smartphone? We conduct business from them, run our homes, shop, bank and track our health from them. How many have given up landline phones and only use thei…… https://customcomputer.me/blogs/mobile-devices-convenient-and-useful-present-special-risks

Keeping your data safe: Access Control

Protecting your data is achieved by a combination of practices. Are you covering all the bases?
Cyberattacks are commonplace today. Malware such as viruses, worms and more recently ransomware not only corrupt your data or hold it hostage, but also inflict irreversible damag…… https://customcomputer.me/blogs/keeping-your-data-safe-access-control

It is Heaven! Using the Cloud to Challenge Big Business

What is the cloud? How can it benefit your business?
Has anyone suggested you begin moving your business to the cloud? Cloud data storage or cloud computing? What is this, anyway? And isn't it something for huge companies? …… https://customcomputer.me/blogs/it-heaven-using-cloud-challenge-big-business

WFH Means More Vulnerability to Cybercrime - Here are Some Methods to Stay Safe

WFH opens up whole new horizons in terms of flexibility, productivity, and cost savings. But, it also opens your business up a little more to cybercriminals, as you can’t have a hands-on approach to cybersecurity, especially if your employees are using th…
WFH opens up whole new horizons in terms of flexibility, productivity, and cost savings. But, it also opens your business up a little more to cybercriminals, as you can’t…… https://customcomputer.me/blogs/wfh-means-more-vulnerability-cybercrime-here-are-some-methods-stay-safe

Data Safety Best Practices in a Remote Work Environment

Do you have staff working from home? Many businesses shifted to the remote working environment through the pandemic. While it raises some data security concerns, they can be overcome by following a few best practices.
Do you have staff working from home? Many businesses shifted to the remote working environment through the pandemic. While it raises some data security concerns, they can be ov…… https://customcomputer.me/blogs/data-safety-best-practices-remote-work-environment

Multi-Factor Authentication 101

Multi-factor authentication is not new, but more vendors are suggesting and even requiring it to secure accounts on their systems. We will discuss what multi-factor authentication is and why you should be adopting it.
You have probably already come across the term multi-factor authentication (MFA, sometimes 2FA).  The concept is not new, but more vendors are suggesting and even requirin…… https://customcomputer.me/blogs/multi-factor-authentication-101

Two Basic Routines to Protect Your Data

Cybersecurity is nothing to be ignored by organizations no matter their size in terms of client base, staff or sales revenue. Cybercriminals don’t discriminate when it comes to choosing their victims.
Cybersecurity is certainly nothing to be ignored by organizations no matter their size in terms of client base, staff or sales revenue. Cybercriminals don’t discriminate …… https://customcomputer.me/blogs/two-basic-routines-protect-your-data