Article, Cybersecurity Bob Coppedge Article, Cybersecurity Bob Coppedge

Does Microsoft Back Up Your 365 Data?

We’ve said it several times before. The last line of defense for almost all bad things in IT is a good backup. Does it make sense that your Microsoft 365 data…emails, contacts, calendars, SharePoint Online, OneDrive for Business, Teams…should absolutely be backed up and protected. Is it (I hear you cry)?

Read More
Article, Cybersecurity Patti Smerk Article, Cybersecurity Patti Smerk

Keylogger…What Is It and What Does It Do?

Keyloggers are programs that capture everything you type. Passwords, credit card numbers, the webpages, answers to security questions – all by logging your keyboard strokes. The program is installed on your computer, usually through some form of spyware, and records what you type. All of this is then sent to the the bad guys use it to in a number of their bad guys ways.

Read More
Article, Cybersecurity Bob Coppedge Article, Cybersecurity Bob Coppedge

What is Shadow IT?

Shadow IT is a term given to IT resources…hardware, software, subscriptions, services…that are used by an organization without the knowledge of whoever’s handling IT or cybersecurity for the organization.

Keep in mind Shadow IT isn’t necessarily evil. Or destructive. It’s…well, honestly you don’t know what it is. And that’s the problem.

Read More