Author Archives: Tom
How to Choose a Data Reporting Solution
Everyone can appreciate a report that is clear, concise, and comprehensive. Finding a data reporting [...]
Nov
“Apple Care” Vishing Attacks
One of our partners, KnowBe4, recently warned of vishing attacks (like phishing, but by phone). Each [...]
Oct
Latest Hacker Scam – Posing to be Your Vendors
Hackers have found a new target – trusted relationships between your organization and your outside [...]
Oct
Safety Net Introduces Text for Support
There are times when reaching out for IT support via traditional methods can be a [...]
Sep
Cyber Security: How to Protect Your Business
In the first half of 2018, over 760 million data records have been breached in [...]
Sep
Does Your Business Need Standardized Email Signatures?
Standardized email signatures are valuable. They convey more about your company than you may realize. [...]
Sep
Quick Email Spam Test | How to Approach a Suspicious Email
Phishing attacks are one of the most frequent ways malicious hackers gain access to confidential [...]
Sep
Windows 7 End-of-Life Coming Soon
Windows 7 launched in late 2009 with a 10-year commitment from Microsoft to provide product [...]
Aug
Safety Net Spotlight: Proactive Network Administrator
You’ve likely heard the term Network Administrator or Net Admin. A less common role is [...]
Hotel Wi-Fi: Should I Use It? – 7 Things to Know
Free hotel Wi-Fi. It’s an amenity most of us “click” as required in a hotel [...]
Aug