Learning Center: Videos
Our Learning Center Video Library is designed to provide answers to questions that we are most frequently asked. Since we have so many videos, we have separated them out into categories to help you navigate to the video that will best answer your questions. We also have a search feature on each page.
-
Should I Get Rid of or Update Flash?
Adobe Flash was an add-on to most web browsers back in the day. It really enabled web sites to do a lot. It especially makes it easier for bad guys to do bad things. In fact, both Microsoft and Adobe (and honestly everybody else in the industry strongly recommended removing Flash from all computers and web sites.
Can Anyone Fall Victim to a Hack?
Everyone – and I mean everyone – can fall victim to a hack! Hacking attempts are an issue that should be taken seriously. Why? Well, 43% of cyber hacks are aimed at small businesses. And 60% of companies who fall prey to a hack experience a complete crash in the following six months.
What is a Keylogger?
Keyloggers are programs that capture everything you type. Passwords, credit card numbers, the webpages, answers to security questions – all by logging your keyboard strokes. The program is installed on your computer, usually through some form of spyware, and records what you type.
LastPass Hack.... Worse Than We Thought?
So we talked about the security vendor, basically a password vault, LastPass was breached. At that time, both LastPass and we said it was not that big of a deal because they didn't get much. Well, it turned out not entirely accurate.
What is Distributed Denial of Service (DDoS)?
A DDoS attack stands for “denial of service” attack, where the bad guys try to overwhelm a network or server with a ton of traffic. This will typically cause whatever they hit, like your website, online platform, or application, to crash.
What is a Botnet?
What is a botnet? We talked recently about what a bot (short for robot) is (usually a computer that’s been compromised to do bad things quietly in the background). But what’s a botnet?
What is a Bot?
What is a bot? A bot is short for robot, but that part you probably knew. These days the term “bot” is used most often for cyber security.
What is Cloud9?
Cloud9 is the name of a lot of things. Unfortunately, it is now the name of a new botnet. Oh, that’s a network of computers all running malware applications, usually without the knowledge or permission of the computer owner.
What Should I Do When My Business Credentials Are Stolen?
You’ve just discovered there are compromised employee credentials or other sensitive data of your company exposed and available on the Dark Web. Your company should immediately start taking appropriate steps and measures to correct or minimize the risks and potential damages associated with this exposed data.
How to Choose the Right Password Manager?
First it must be protected by end-to-end encryption. This means even if your data is intercepted, no one can read it. Next, make sure the manager works across all applications.
What is Authentication?
Authentication is a process to validate the identity of someone (or something). For this conversation we’re talking strictly in the cyber world.
Are Cyber Criminals Entrepreneurs?
Think about the bad guys behind cybercrime. Do you think of the evil genius writing evil stuff living in moms basement? Or the head of an organization with employees, products and marketing strategies making millions of dollars?
How Can I Tell If an Email Is a Scam?
I want to show you something that we just received that is actually kind of funny. Spoiler alert it's bad guys trying to get us to give them money and we foiled it. We will show you how!
What Should You Do If Your Organization Has Been Breached?
Does your organization have data backups or an incident response plan? If you already have an organization with a strong cybersecurity background, contact them immediately and follow their lead. If you’re on your own, here are some steps you can follow.
Should You Care About Uber Being Hacked?
Should You Care About Uber Being Hacked? The quick answer is yes-ish. So far Uber has not come forward with any claims of any meaningful user data but the jury is still out to a certain degree. So what should you do?
Am I Too Small For Cybercriminals?
The bottom line is you’re “big enough” to warrant attention. Everyone is. And your organization is “big enough” to warrant the same attention from the bad guys. All organizations are. It’s time for you to take security seriously!
Why shouldn't everyone have access to everything?
The principle of least access is the idea that an employee only should have access to the bare minimum amount of technology systems they need to do their job. Applying the principle of least access will limit the amount of information that is compromised during an attack.
Should I Be Concerned About LastPass And Their Data Breach?
So, you've heard us (and lots of other folks) warn you over and over again...use a password manager to protect your...ummm...passwords. Like LastPass. You know, the cloud-based password manager that was hacked two weeks ago.
Types of Phishing Attacks and How to Avoid Them
Here are a few types of phishing campaigns and how they work. And the best way to protect against phishing is to protect your information and your technology by using multifactor authentication, and train your employees.
Who Are NIST and CISA and Why Do They Matter?
NIST stands for National Institutes of Standards and Technology and they're the ones that define all these industry standard practices. They're the ones that define what exactly is a pound, but they also write cybersecurity frameworks and compliance frameworks.
Should Users Have Admin Rights?
What are “Local Admin Rights” for computers, and do I want my end users to have them? Every time you log onto your computer, you’re doing so with your “User Account”. That’s not just your user name and password. It’s all of the setting specific to your account.
What is a Pen Test?
Pen testing is short for penetration testing, which is where you hire the good guys to act like the bad guys and break into your network. A good pen tester will do some information gathering, which is referred to as reconnaissance, ahead of time.
Can Your Cyber Insurance Claim Be Denied?
Insurance companies are getting stricter in what their clients need to do on the security front before offering a cyber security policy.
Why Do I Still Get Spam if I Have a Spam Folder?
The simple answer is that computers aren't perfect. The bad guys are using low-tech emails from using common email addresses from a legit email provider like Gmail or Yahoo.
New Exchange Threat, Should I be Worried?
What is the new exchange threat? Should I be worried about the new exchange threat? How can I protect myself against the new exchange threat?
What is Follina?
In a nutshell Follina is where bad guys send a malicious document, usually as an email attachment. That document would open up a URL (a web address) and start executing code located on that web site to take control of the system that opened up the document.
What is TPM and Why Should I Care?
So you’re wondering whether it’s time to replace your desktops and/or laptops. Or you’re buying new computers but want to save as much money as you can. Why should the term “TPM” mean anything to you?
Can you Completely Outsource Cybersecurity?
Cybersecurity is complicated. As we’ve discussed before, every opportunity to get data flowing between applications, devices, organizations, anything…is an equal opportunity for a bad actor to access that data.
Doesn't IT Handle All Cybersecurity?
Doesn't IT handle all cybersecurity? In a word no. This video is a great explanation as to why cybersecurity is more than just the IT department or MSPs responsibility.
Why is Cyber Security Always Changing?
IT has developed incredible ways to increase productivity for organizations where they bring value throughout the organization and for all their customers and stakeholders.