Posts by Dennis Bourn
Essentials for Empowering Remote Work
COVID-19 is forcing many businesses to embrace remote work. The technology needed to enable people to work from home has existed for years, but working from home may be new for you and your employees. Here are some essentials you need to address to empower your remote workers.
Read MoreQuickly Become A Google Fu Master… Here’s How
That’s Google Fu, the ability to use search engines to whip up answers and research faster than a contestant on a radio quiz.
Read MoreMischievous Malware
Unfortunately, malware is not a foreign term, in fact it’s pretty well known to anyone that uses a computer. There are several types of malware, as well as mediums in which you may receive it. So, before you click on that link for the free cruise you won, think about all of the personal data…
Read MoreSocial Engineering = Fancy Job Title for Hackers
Social engineers can gain information through emails, pop-ups and public Wi-Fi networks
Read MoreWhat is the True Cost of an Hour of Downtime for Your Business?
Contrary to what many perceive, up to 80% of startup businesses make it past their first year. But a few years after that, keeping the company afloat becomes an uphill task. According to Forbes, only 45.5% of the remaining businesses survive. The number one culprit to blame for the catastrophic deaths of most businesses is downtime.…
Read MoreIdentity Theft is mainstream according to Jefferson Parish Sheriff’s Office
There is an interesting article on NOLA.com today that paints a grim picture about your data finding its way onto the dark web. “While it’s true that there’s little you can do to prevent your personal data from ending on the dark web or remove it, once it’s there you can limit the damage, investigators…
Read MoreFixing Your Weakest Link: Your Employees
your employees will still be the biggest vulnerability in your organization when it comes to phishing
Read MoreHow to Spot A Phishing Attack
How to Spot A Phishing Attack Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing websites every month. A 65% increase in…
Read MoreWhat Is Phishing & How Are Hackers Using It?
What Is Phishing & How Are Hackers Using It? While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the…
Read MoreWhat is Managed Services
Managed services is a term that makes absolutely no sense—unless you’re in the IT industry. So, for those of us who don’t know what it means or why it’s important, let’s get right to it. Managed services is fully outsourced IT that takes care of all the headaches you normally associate with technology. Basically, if…
Read More