Posts

,

Popular Phone Scams & How To Avoid Them Part 2

Popular Phone Scams & How To Avoid Them Part 2

In this second installment of our two part series on phone scams, we dive into a new trend of SMS based scamming called SMShing. We also take a closer look at the popular IRS based phone scam and how to spot it from a mile away. Here’s a hint . . . the IRS doesn’t call and demand immediate payment without an opportunity to ask questions or appeal. Make sure to give this article a read and share with family and friends.

Read more
,

5 Cyber Security Features/Protocols Your Business Needs To Protect Against Scammers, Hackers & Cyber Criminals

Top 5 Cyber Security Protocols | IT Support

Ever wonder what simple steps you could take to improve your overall network security? With new attacks and strategies hitting your network and employees daily, there are many different security tools and protocols available for your business. It is an ongoing battle but with the right planning and implementation, you can protect yourself. Learn more about these features and protocols here . . .

Read more
,

Password Quick Tips – 6 Do’s And Don’ts

IT Password Protection Quick Tips | IT Data Networks

Passwords are the goalie of the internet. They prevent unwanted intruders from accessing accounts, personal information, messages and more. It is very easy to create ONE strong password but it can be very annoying/overwhelming to try and keep every password you use secure. We’ve put together some quick and simple tips you can use to create strong passwords. On top of that, we threw in three of our favorite security tools to help you out.

Read more
,

3 Ways Data Encryption Can Save You From Unnecessary Stress, Spending & Headaches

Data Encryption Protection PII

When you think of data encryption, you might imagine top-secret files and espionage. Historically, militaries and governments protected messages and sensitive information using encryption. These days encryption has many more uses and with hackers and cyber criminals constantly after your data, it is important that you make use of this security measure.

Read more
,

3 Critical Steps You MUST Take To Avoid WannaCry And Ransomware Like It

wannacry ransomware prevention

How confident are you in your cyber security protocols? If you got hit by ransomware today, would you know how to get yourself back up and running without paying the cyber criminals a dime? Do you have an IT partner who can visualize your server real time so you don’t lose time and money during a disaster? These are all questions you should have answers to and part of a larger conversation about proper cyber security preventions. Read on to learn more about one of the most recent cyber security attacks – WannaCry – and what you need to do to protect your business.

Read more
,

Don’t Use Public WiFi Without Reading These Data Security Quick Tips

public wifi is dangerous for data security

We’ve all done it. Signed into the public WiFi at a restaurant or coffee shop. Being connected has become a commodity these days and hackers are just waiting to take advantage of you and your data. This month we dive into a few quick tips to secure your mobile devices and laptops from outside intruders when working on the road or connecting to a free hotspot.

Read more
,

Stop These 3 Hazardous File Sharing Habits Yesterday!

file sharing tips with ATS IT Managed Services

If you are in business, you have file sharing needs as well as habits. This activity comes with its own risks though and it is important to protect yourself when it comes to sharing files both internally and externally in business. Read on for 3 hazardous file sharing habits you have to stop yesterday!

Read more