5 Ways to Secure Your Company’s Wireless Router
Wireless routers are used by companies around the world. They typically serve as the core of a company's network, enabling both wired and wireless devices to connect to each other and access the Internet. The setup for a wireless router often involves connecting it...
How to wipe your hard drive.
Every year you read about confidential data being recovered from recycled computers. See Confidential data found on old state computers sold as surplus, audit says and Computer hard drive sold on eBay 'had details of top secret U.S. missile defence system'. A recent...
5 Ways to Train Security-Conscious Employees
Organizations around the globe are storing more sensitive data than ever. It has become increasingly important for employees handling this data to be aware of modern cyber security best practices and threats. When dealing with large volumes of sensitive data, lack of...
4 Common IT Mistakes That Small Companies Make
A vast majority of small companies rely on the latest technology to run efficiently. For these companies, making smart IT decisions can affect daily operations, as well as long-term success.Here are 4 common IT mistakes that small companies should avoid:1. Failing to...
What You Need To Know About Anthem’s Security Breach
US health insurer Anthem Inc. announced on February 4, 2015, that it was the victim of a sophisticated cyber attack resulting in the theft of tens of millions of records. Hackers were able to break into a database that contained as many as 80 million records. These...
What Small Businesses Can Learn From Sony’s Major Cyber Security Mistakes
Life at Sony Pictures Entertainment Inc. is slowly getting back to normal after becoming the victim of one of the most malicious cyber attacks in history. Sony's employees arrived at the office on November 24, 2014, to find the image of a red skull on all of their...
Benefits of Remote Monitoring
The Miller Group, like many IT service providers, uses remote monitoring tools to gather information and send reports about our clients’ computer systems. Almost anything can be monitored, from routers and firewalls to virus detection and email services. Here are six...
Enabling Two Factor Authentication for Your DropBox Account
Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. In this context, the...
Microsoft Office 365 – Two Factor Authentication
Microsoft Office 365 is a cloud-powered version of Microsoft Office. In addition to the standard features, this new version of Office now offers online conferencing, file sharing, business-level email, shared calendars, and website creation. Unfortunately, since...
Enabling Two Factor Authentication for Your PayPal Account
If someone could use your credit card online to make a purchase and just need to enter your username and password to do so, would you be a bit concerned? Well, that is what someone can do if they have your username and password for your PayPal account. Luckily PayPal...