Skip to content

Cyber Security

The What, Why, and How of “The Cloud.”

If you don’t know your IP from your URL or your VLAN, this column is for you! Welcome to In Plain English where you’ll learn some techie stuff from a non-tech person who just so happens to have worked with a bunch of computer geniuses for the last 25 years. Today’s Topic: The What, Why, and How…

Read More...

Don’t Fall For These Shopping Scams

Black Friday is almost here and although we’re all excited to find the best deals, make sure to be on the look-out for scams across the internet! Here are some tips to keep in mind to help you shop safely. Warning Signs Many of the ads are for off brand gadgets or they’ll offer luxury…

Read More...

What’s an IP Address?

If you don’t know your IP from your URL or your DNS, this column is for you! Welcome to In Plain English where you’ll learn some techie stuff from a non-tech person who just so happens to have worked with a bunch of computer geniuses for the last 25 years. Today’s Topic: What’s an IP address? When you…

Read More...

Who Clicked? The Story of Lori

Lori got a message from a common banking ap that said her account had been compromised. Normally, she doesn’t even listen to her voicemails and she did what most people do, she ignored it. A few days later Lori answered the phone and it was an urgent call saying her account had been compromised. The…

Read More...

Who Clicked? The Story of Mary

Mike and John are hackers that are very successful at their job.  Mary is CFO at her midsize company and responsible for about 10 million dollars.  The following is a fictional scene based on real methods that hackers use today: At hacker’s headquarters: “I think today is the day.” said John. “Really, you think she’ll…

Read More...

Who Clicked? The Story of Emily

Look at the cute little boy There was a woman, let’s call her Emily. Sometimes at work when Emily had a break, she would take a few minutes and go through Facebook.  One day there was a story about an amazing little boy.  He took all his birthday presents and donated them to children in…

Read More...

Who Clicked? The Story of Jim

Had I known then… Jim liked to watch the news online and surf the web during breaks.  Nothing that was inappropriate, just normal websites, Facebook, news, weather, etc. Next thing you know his computer was showing some weird things on the screen. Uh oh, he thought, I better let Fred know so he can call…

Read More...

I Love Technology

I’ve had over 40 years to think about this and I’m still not prepared.  My father was involved in artificial intelligence and I grew up knowing someday we would be playing games with  holograms and experiencing a world that wasn’t real.  This wasn’t like a science fiction movie, it was real life. My dad, my hero,…

Read More...

Do You Really Need A Penetration Test?

The short answer is probably not. But let’s start at the beginning. To truly answer whether you need a penetration test, you need to know why you need one. Are you uneasy about the security of your environment? Is a third party recommending you consider it? Do you need one to comply with certain regulations…

Read More...

Risky Business: Defining 3rd Party Vendor Risk

Hiring third-party vendors to provide services at an affordable rate has gained traction as a major trend among businesses, and exponentially so for businesses in need of IT support. Paying a trained team by a flat monthly fee or the hour in lieu of hiring new full-time staff for an empty role can definitely make business…

Read More...

We Have The Plan, You Have The Peace Of Mind