Posts

,

Password Quick Tips – 6 Do’s And Don’ts

IT Password Protection Quick Tips | IT Data Networks

Passwords are the goalie of the internet. They prevent unwanted intruders from accessing accounts, personal information, messages and more. It is very easy to create ONE strong password but it can be very annoying/overwhelming to try and keep every password you use secure. We’ve put together some quick and simple tips you can use to create strong passwords. On top of that, we threw in three of our favorite security tools to help you out.

Read more
,

3 Ways Data Encryption Can Save You From Unnecessary Stress, Spending & Headaches

Data Encryption Protection PII

When you think of data encryption, you might imagine top-secret files and espionage. Historically, militaries and governments protected messages and sensitive information using encryption. These days encryption has many more uses and with hackers and cyber criminals constantly after your data, it is important that you make use of this security measure.

Read more
,

Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled

Google Location History - IT Networks - Big Brother is Watching

Internet privacy is a touchy subject these days. With more and more connected devices in our homes and businesses, it is important that you know what settings allow in terms of data collection and your privacy. Google Location History is an interesting application that tracks your movement throughout the day. It is benign enough but you wouldn’t believe how closely this app can track your movements. Read on to get a look at how it works and also some instructions on how to enable it if you choose.

Read more
,

5 Critical Components Any Professional Disaster Recovery Plan Must Have

Disaster Recovery Plan IT

If you are in business, you have most likely considered what you might do if a disaster hit. Disaster happens. Theft, hardware failure, ransomware and other viruses, even natural disasters . . . Disaster recovery and business continuity must be things you have planned for the safety of your business, your employees and your reputation. When considering a proper and professional disaster recovery plan, many variables need consideration. Read on for our 5 Critical Components Any Professional Disaster Recovery Plan Must Have.

Read more
,

3 Critical Steps You MUST Take To Avoid WannaCry And Ransomware Like It

wannacry ransomware prevention

How confident are you in your cyber security protocols? If you got hit by ransomware today, would you know how to get yourself back up and running without paying the cyber criminals a dime? Do you have an IT partner who can visualize your server real time so you don’t lose time and money during a disaster? These are all questions you should have answers to and part of a larger conversation about proper cyber security preventions. Read on to learn more about one of the most recent cyber security attacks – WannaCry – and what you need to do to protect your business.

Read more
,

Don’t Use Public WiFi Without Reading These Data Security Quick Tips

public wifi is dangerous for data security

We’ve all done it. Signed into the public WiFi at a restaurant or coffee shop. Being connected has become a commodity these days and hackers are just waiting to take advantage of you and your data. This month we dive into a few quick tips to secure your mobile devices and laptops from outside intruders when working on the road or connecting to a free hotspot.

Read more