The short video below is a step-by-step explanation of how to setup two-factor authentication (2FA) for Microsoft 365 using the Authenticator app
In today’s digital business world, hackers are after your most precious asset—your data. Companies, especially small businesses, need to stay vigilant to keep their network secure.
Having good strong passwords in your environment is one of the first important steps for good security. For any hack to happen they need to get access and the first line of defense is your passwords.
Two-Factor Authentication (2FA) is a way to require two or more steps from more than one device to confirm you are allowed into a system.
Why now is the time for Cyber Security Training Network People President Nate Freeman and CIO Corey Joy discuss why cyber security training is so important now more than ever due to COVID-19 impacts. https://youtu.be/zZ4LKUwxLYY
Setting Up Remote Access The Entire Country Just Went Into Disaster Recovery (DR) Mode. However unlike a DR situation where your office may be out of power or not accessible for a while, you should be able to keep any technical systems that are located in your office running and available. If you have systems […]
With the current estimated cost of Cybercrime being over $4 billion a year, the importance of your awareness is no joke. Keeping your assets safe starts with you – and knowing what you’re dealing with is key. I just read a few articles that really opened my eyes to the importance of understanding just how […]
It seems every day that world news is full of more examples of growing tensions on the international stage. After the news last fall of Russian bomber jets flying over the Baltic and North Seas and on down to the Coast of Portugal, plus suspected Russian sub sightings near the Swedish capital of Stockholm—all on […]
Something very interesting (not in a good way) happened to me recently, and I felt like I should share it with everyone. I was at home on my PlayStation 4, when all of a sudden I received a message from EA sports. They make the Madden football game that I have been playing for twenty-five […]
Last week, a UK security blogger posted a detailed article describing how he used a vulnerability in a Canon Pixma MFP to run the 90’s video game DOOM on the printer’s color interface. http://www.contextis.co.uk/resources/blog/hacking-canon-pixma-printers-doomed-encryption/ That alone—getting the game working on a printer, famous for being ubiquitous in its time—is quite the accomplishment. While the blogger […]