2021 Cybersecurity Awareness Month: A Message From Our CEO

Hello Everyone, Bad guys have reached an all-time low and we see a quadrupling of deliberate targets and people in QC organizations. We now strongly recommend all our customers use a form of end-user training – we use and support KnowBe4, which we see allows employees to recognize baddies and reduce mistakes in opening “bad”…

Continue reading

Why You Need Multi-Factor Authentication Today

Cloud adoption is pretty much a given for companies these days. The increase in cloud use over the last few years has helped small businesses be more competitive, and it has allowed many companies to continue serving customers during the pandemic. Cloud technology can keep a business going from any location; however, it can also…

Continue reading

How to Use Email Encryption to Protect Sensitive Communications

A plain text email is about as secure as a postcard. Any hacker or unintended recipient that intercepts a non-encrypted email can easily read it with no special skills or software needed. What’s even more eye-opening are the types of messages that employees send by unprotected email. They’ll send confidential customer information, passwords, and even…

Continue reading

Zero-Day Exploits and How to Defend Against Them

When reading about ransomware attacks or data breaches in the news, you’ll probably run across the term “zero-day exploit.” This type of attack is often at the heart of many widespread attacks because it’s one of the most difficult for traditional cybersecurity methods to detect. A recent example was the breach of the Microsoft Exchange…

Continue reading

Layered Security Services

Protecting your data, your processes, and your investment Companies across the globe took a new approach in 2020 to doing business, including moving more to the cloud and using virtual workflows for the first time. This opened the door even wider to cyberattacks. Cybercriminals look to businesses of all sizes, not just big businesses. Don’t…

Continue reading

Demonstrating Compliance With Data Security Regulations Can Be Easy If You Are Prepared

Keep a close watch on IT system access These days, most businesses are subject to data protection laws or regulations of one kind or another. Violations often come with pretty stiff penalties. To help demonstrate you are compliant with access control requirements, you should have clear policies and procedures about who gets access to what,…

Continue reading

TSTS Virtual Event: Defending Network Edges with the Zero Trust Access Model

Join from your computer, tablet or smartphone. https://global.gotomeeting.com/join/775889533 You can also dial in using your phone. United States: +1 (571) 317-3122 Access Code: 775-889-533 Lunch gift cards will be provided for the first 20 participants that register and attend. Event Description There were 96% more network breaches in 2020 than in 2019. The main driver…

Continue reading

What is the Best Way to Change Your Passwords?

You change your clothes. You change your oil. Make sure you also change your passwords. An alert pops up on your computer: It is time to change your password again. Sigh. Fine. You will just change from password4! to password5! and― Not so fast. Regular password changes are meant to make sure that even if…

Continue reading

How Strong Are Your Passwords?

  Strong Security Starts with Strong Passwords If you use the same password for multiple systems―online shopping, email, your company’s cloud bookkeeping solution, etc.―you are not alone. Even Facebook founder Mark Zuckerburg is guilty of this. In 2016 his LinkedIn credentials were compromised in a major breach, giving hackers access to his Twitter account, too,…

Continue reading