Posts

,

5 Ways To Keep Cyber Criminals At Bay This Holiday

cyber criminals holiday online shopping

Nobody wants to start the new year with a stolen identity or credit card fraud to deal with. This time of year is one of the biggest for retail – both brick and mortar and online. And any time people are buying things, cyber criminals and hackers are going to be trying to steal private information. Protect yourself this holiday and take a look at these 5 ways to keep the criminals at bay.

Read more
,

5 Cyber Security Features/Protocols Your Business Needs To Protect Against Scammers, Hackers & Cyber Criminals

Top 5 Cyber Security Protocols | IT Support

Ever wonder what simple steps you could take to improve your overall network security? With new attacks and strategies hitting your network and employees daily, there are many different security tools and protocols available for your business. It is an ongoing battle but with the right planning and implementation, you can protect yourself. Learn more about these features and protocols here . . .

Read more
,

Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled

Google Location History - IT Networks - Big Brother is Watching

Internet privacy is a touchy subject these days. With more and more connected devices in our homes and businesses, it is important that you know what settings allow in terms of data collection and your privacy. Google Location History is an interesting application that tracks your movement throughout the day. It is benign enough but you wouldn’t believe how closely this app can track your movements. Read on to get a look at how it works and also some instructions on how to enable it if you choose.

Read more
,

3 Critical Steps You MUST Take To Avoid WannaCry And Ransomware Like It

wannacry ransomware prevention

How confident are you in your cyber security protocols? If you got hit by ransomware today, would you know how to get yourself back up and running without paying the cyber criminals a dime? Do you have an IT partner who can visualize your server real time so you don’t lose time and money during a disaster? These are all questions you should have answers to and part of a larger conversation about proper cyber security preventions. Read on to learn more about one of the most recent cyber security attacks – WannaCry – and what you need to do to protect your business.

Read more
,

Stop These 3 Hazardous File Sharing Habits Yesterday!

file sharing tips with ATS IT Managed Services

If you are in business, you have file sharing needs as well as habits. This activity comes with its own risks though and it is important to protect yourself when it comes to sharing files both internally and externally in business. Read on for 3 hazardous file sharing habits you have to stop yesterday!

Read more