We’re all targets for phishing, and you can imagine how attractive the Senate staffers would be! Mike briefly covered the various types of phishing, including Credential, Spear, Whaling and Business Email Compromise. He included examples and discussed how to spot each type.
Blog
PCI Validated P2PE – The Simple and Safe Path to PCI Compliance
Blog
Mr. Jennings Goes to Washington…
Managed IT Services
9 ways to streamline your next IT project
Blog
Avoid Network Downtime - 5 Steps to Creating a “Neverdown” Network
Blog
5 tips for managing your business IT infrastructure
Managed IT Services
Essential IT checklist for new office setup
Blog
How to protect your network while allowing BYOD
Managed IT Services
5 steps to a solid BYOD policy
Managed IT Services
6 things a good network risk assessment should include
Blog
6 ways to protect your business from phishing attacks