Twin State Technical Services, a leading provider of IT support and cybersecurity solutions, has once again emerged at the top of the annual “Best of the Region” awards. The awards recognize excellence in various business categories, voted on by subscribers of the Quad Cities Business Journal. Twin State Technical Services has triumphed for the second…
cyber security
reCAPTCHA: What It Is and Why You Should Use It on Your Website
Every once in a while, you will encounter a prompt that asks you to prove whether you are a human or not. These are called CAPTCHAs or Completely Automated Public Turing test to tell Computers and Humans Apart. To put it simply, it is a cybersecurity measure meant to differentiate humans from bots. reCAPTCHA is…
Pros & Cons of Using Facebook or Google for Logins
A few years back, large cloud services like Google and Facebook, began allowing other websites and services to authenticate new users through their websites. OAuth, which stands for Open Authorization allows signing in to services such as Zoom, without setting up a new account; instead, it uses Google ID or Facebook login information. Many find this…
End Of The Year Tech Message From Beth Tinsman From Twin State
Hello everyone, As we race to close out 2021, I have some key messages to share about tech and I’ll keep it fun and simple. We stand near-50 strong and remain dedicated to enabling technology for our organizations, so they thrive in the community we have. We continue to work in the optimization zone for…
Tips to Identify Scams/Scammers & How to Avoid Being a Victim
Malware and ransomware attacks continue going up. In 2020, ransomware attacks increased 485%, and during the first half of 2021, they’ve risen another 151%. Cyberattacks have become one of the biggest risks to an organization. Falling victim to one can mean hundreds of thousands of dollars in remediation costs. This makes IT security defenses a…
2021 Cybersecurity Awareness Month: A Message From Our CEO
Hello Everyone, Bad guys have reached an all-time low and we see a quadrupling of deliberate targets and people in QC organizations. We now strongly recommend all our customers use a form of end-user training – we use and support KnowBe4, which we see allows employees to recognize baddies and reduce mistakes in opening “bad”…
How to Use Email Encryption to Protect Sensitive Communications
A plain text email is about as secure as a postcard. Any hacker or unintended recipient that intercepts a non-encrypted email can easily read it with no special skills or software needed. What’s even more eye-opening are the types of messages that employees send by unprotected email. They’ll send confidential customer information, passwords, and even…
Overview of the Latest WordPress Updates & Why You Need to Stay Current
When you log in to add content to your WordPress site and see that there is an update, what is the first thing you think? Some website owners cringe, think, “I don’t have time for this now!” and move on with their work. Then before they know it, they are several versions behind and much…
Zero-Day Exploits and How to Defend Against Them
When reading about ransomware attacks or data breaches in the news, you’ll probably run across the term “zero-day exploit.” This type of attack is often at the heart of many widespread attacks because it’s one of the most difficult for traditional cybersecurity methods to detect. A recent example was the breach of the Microsoft Exchange…
Layered Security Services
Protecting your data, your processes, and your investment Companies across the globe took a new approach in 2020 to doing business, including moving more to the cloud and using virtual workflows for the first time. This opened the door even wider to cyberattacks. Cybercriminals look to businesses of all sizes, not just big businesses. Don’t…