Archives -


Look For The Lock: Ensuring Website Legitimacy

When browsing the Internet, you may have noticed that some sites will display a lock icon next to the URL address (as shown below): This icon, along with the ‘s’ following ‘http’ in the address line, is your indication that the communication between your device and the website is secure. When logging into your credit …


Why Password Variation Is Critical: Credential Cracking & Credential Stuffing

Recently, there have been two high-profile customer data breaches in the news that are examples of credential cracking and credential stuffing: on November 9th at Dell Computers and on October 31st at Dunkin Donuts. The Dunkin Donuts incident required all DD Perks members to change their passwords. Let’s dig a little deeper and look at …


Cybersecurity For Today’s Network Threats

The threats to your network and your phone are increasing each and every year. According to the independent IT-security institute, AV Test, over 350,000 new malware programs are written every day! Over 125 million new malware applications were written in 2017 alone. While the cybersecurity industry does a great job identifying threats and providing tools …


Spear Phishing and Fake URLs

Spear phishing attacks are often more successful than regular, broad-based phishing attacks because of the way hackers are able to personalize emails containing malicious files or links. If you receive a phishing email that is addressed “Dear Customer” or “To our Registered Clients,” you are less likely to be fooled than by a duplicitous email …


How Long Should You Retain Email?

If you Google this question, you will find some very thoughtful responses. As for me, I try to determine the value of each email immediately after having read it, deciding whether to delete or keep it. At the end of the day, I like to focus on the emails that came in that day and …


GDPR and Its Effects on Business Owners

As a professional services business owner who provides IT services to organizations in Rhode Island, Massachusetts, and Connecticut, I never expected that I would spend 40-50 hours becoming intimately acquainted with a new law passed by the European Union. But that’s exactly what I have done since the rollout of the General Data Protection Regulation …


Go Phish

Phishing and spear phishing continue to be lucrative enterprises for hackers. An effective strategy to prevent these attacks is a layered security approach with technical layers like hardened firewall configurations, anti-virus software, and email and web content filtering solutions. Fortunately, legitimate technology developers and support organizations are continuing to develop great technology tools to help …


Why Investing in Your Users Pays Dividends

Information Technology professionals have long heard the expression that the “best way to secure a computer is to pull the plug.” Barring the benefits to your electric bill, let’s face it – that is not a practical solution. Computer viruses, which pose the biggest challenge with information security, have been around for a long time. …


Is Your IT Partner a Passive Player or a Proactive Leader?

Several years ago, after providing a check to a merchant for a service I received, the clerk handed the check back to me attached to my receipt. It was marked ‘void.’ During a subsequent conversation with my banker, he explained the process, mentioned that check scanning was available through them and asked if I was …


Buyer Beware: There is no universal standard for the “Managed Service Program”

In our industry, ad-hoc network support services have become obsolete in favor of a more pro-active, managed approach to network support and security. This evolution occurred due to the growing frequency and increasingly sophisticated attacks to our data networks. Many organizations are now offering “managed service programs” (MSPs). Unfortunately, if you’ve seen one managed service …