https://beinetworks.com/wp-content/uploads/2020/10/MFA-shutterstock_530465938.jpg 600 850 BEI /wp-content/uploads/2018/02/bei-logo.png BEI2020-10-13 08:00:212020-10-14 08:48:42Multi-factor Authentication – A Must Do!
According to Microsoft, Multi-factor Authentication (MFA) can block over 99.9% of cyber attacks that aim to compromise an account. These accounts include email, banking, shopping, and others. Hacks can be devastating – fraudulent emails sent out, credit card and bank accounts compromised, identity theft, reputation damage, and more.
https://beinetworks.com/wp-content/uploads/2020/08/WFHshutterstock_1607004745.jpg 1200 1200 BEI /wp-content/uploads/2018/02/bei-logo.png BEI2020-08-22 10:15:542020-10-12 16:15:33Remote Connections
Many of us have been working at home since March and are starting to evaluate next steps. For some that means continued working from home and for others it may mean a mix of returning to the office and from home. This post evaluates the WFH options and provides pros and cons.
https://beinetworks.com/wp-content/uploads/2020/08/CovidChecklist_shutterstock_1695110740-1.jpg 340 578 BEI /wp-content/uploads/2018/02/bei-logo.png BEI2020-08-04 16:06:342020-10-12 16:22:57Back-to-Work COVID Checklist
This Back-to-Work COVID Checklist is super helpful. It covers People, Workplace, Technology and Customers and may be a useful roadmap as you plan for reopening.
https://beinetworks.com/wp-content/uploads/2020/06/shutterstock_375186478-scaled-e1591985477562.jpg 1094 2560 BEI /wp-content/uploads/2018/02/bei-logo.png BEI2020-06-12 09:41:582020-10-16 09:56:08What is a risk assessment and why do you need one?
How can your organization mitigate cybersecurity risk? The answer lies in risk assessments. Learn more about what they are and how they can help you.
https://beinetworks.com/wp-content/uploads/2020/03/shutterstock_1505391608.jpg 770 1610 BEI /wp-content/uploads/2018/02/bei-logo.png BEI2020-03-04 10:00:002020-11-12 10:09:25How to Pick a Password Manager?
A password manager is like a notebook with your passwords, but with a master key that only you have. This blog helps you compare password managers.
https://beinetworks.com/wp-content/uploads/2020/01/shutterstock_507951898.jpg 266 702 BEI /wp-content/uploads/2018/02/bei-logo.png BEI2020-01-22 10:00:022020-10-19 15:15:58Windows 7 End-of-Life – what’s next?
Microsoft will stop issuing security updates/patches for Windows 7 and Server 2008. These security patches address vulnerabilities that Microsoft has found or that hackers have discovered. If you are in a regulated industry (e.g. HIPAA or FISMA) you will be considered non-compliant. So what should you be doing now?
https://beinetworks.com/wp-content/uploads/2019/10/shutterstock_572358661.jpg 606 1600 BEI /wp-content/uploads/2018/02/bei-logo.png BEI2019-10-15 10:50:442020-10-20 10:42:14The Dark Web – A Scary Story
The Dark Web sounds frightening and it is. It is a place most of us will never visit – it can’t be reached via normal search engines such as Google or Bing.
https://beinetworks.com/wp-content/uploads/2019/09/f2edcaee-3673-434a-a683-f95583db4c94.jpg 266 702 BEI /wp-content/uploads/2018/02/bei-logo.png BEI2019-09-04 10:00:452020-10-20 11:20:41Avoid Network Downtime – 5 Steps to Creating a “Neverdown” Network
Let’s look at the 5 critical steps to creating a network that will remain reliable for both your staff and your customer for years to come.
https://beinetworks.com/wp-content/uploads/2019/07/imgo.jpg 303 800 BEI /wp-content/uploads/2018/02/bei-logo.png BEI2019-07-03 15:09:092020-08-02 12:11:345 steps to a solid BYOD policy
It’s increasingly common for employees to have their own devices – laptops, tablets, phones – at work; devices that they’re comfortable and familiar with. But BYOD policies can create some potentially dangerous situations for employers. Use these steps as you set up your BYOD policy.
https://beinetworks.com/wp-content/uploads/2019/06/RiskAssessment_Featim.jpg 266 702 BEI /wp-content/uploads/2018/02/bei-logo.png BEI2019-06-12 16:00:092020-09-14 17:28:056 things a good network risk assessment should include
A network risk assessment is one of the best ways to keep your network secure. It can identify vulnerabilities and allow you to fix them before cybercriminals exploit them or unwitting employees expose them. Here are 6 services a good assessment should include.