Create secure accounts

Create secure accounts

Learn how to create truly secure accounts. The first thing everyone should do is have Google, Microsoft and Authy authenticator apps. This can be helpful as many websites will require them when you are setting up 2-FA. Therefore, it will save you time to have them...
2-Factor Authentication

2-Factor Authentication

2-Factor Authentication reduces risk by 99%. The biggest cause of attacks are from a business being hacked and your data leaked online. Consequently, your email address password has likely already been leaked, find out here. Therefore, it is strongly advised that...
Cyber Insurance

Cyber Insurance

What you need to know about cyber insurance. Firstly, it helps protect against losses related to computer or network-based incidents. Because of this, cyber insurance is becoming more common for businesses recently. Therefore, we will discuss what you should look for...
Phishing 101

Phishing 101

Learn how to spot any type of phishing attack. A phishing attack is social engineering, an attacker tries to steal sensitive information such as login credentials or credit cards. These attacks are incredibly common. Always check exactly what the email address says,...
Mixed OS Environments

Mixed OS Environments

How best to manage mixed OS environments. OS stands for operating system, which is the interface developed by the manufacturer. For example, most people know Microsoft developed Windows, Apple developed Mac OS and then there’s also the free OS, Linux.  ...
Fall Checklist

Fall Checklist

How we can prepare our homes with technology. Fall marks the time of year that we begin to prepare a smart home for the months ahead. Our home is usually the most valuable investment we own, so we want to discuss how to help protect it from things such as cold weather...