Does Your Business Have Any Cybersecurity Skeletons in the Closet? Let’s dive into a topic that might give you the chills—cybersecurity skeletons in the closet. You may not have old skeletons hidden away in the basement. But there’s a good chance of cybersecurity vul... Best Practices Cybersecurity Sep 7, 2023
12 Ways to Protect Against a Ransomware Attack ... Best Practices Cybersecurity Ransomware Aug 18, 2023
Switching Paradigms Switches are often the unsung heroes of our business networks. They are acquired, setup, and hum away in the closet connecting vital components in our network. If they are running, and running well, w... Networking Aug 11, 2023
How To Evaluate Copier Technologies Listen to the interview Your browser does not support the audio element. A timeless interview with Rich Kinkade from Office Copying Equipment. Rich and Felicia collaborated to bring you full coverage ... Procurement Aug 10, 2023
How to be a Good Consumer of Copier Services and Contracts Listen to the interview Your browser does not support the audio element. A timeless interview with Rich Kinkade from Office Copying Equipment. Rich and Felicia collaborated to bring you full coverage ... Procurement Aug 10, 2023
When IT Admins Go Bad Listen to Felicia's podcast episode Your browser does not support the audio element. Several examples of when IT admins go bad. I talk about steps you need to take to ensure that a bad IT admin doesn'... Best Practices Cybersecurity Insider Threats Security Strategy Aug 10, 2023
The Dark Side of Smart Cities Listen to Felicia's podcast episode Your browser does not support the audio element. Dark side of smart cities https://www.axis.com/blog/secure-insights/what-smart-city A clothing line designed to dis... Cybersecurity Data Privacy Aug 10, 2023
How to get ripped off by cloud hosted server providers Listen to Felicia's podcast episodes Cloud Hosted Servers are Usually a Rip-Off Your browser does not support the audio element. 10 Questions for IT Firms - Part 2 Your browser does not support the au... Procurement Aug 10, 2023
10 Questions for Evaluating IT Firms - Debunked Listen to Felicia's podcast episodes Part 1 Your browser does not support the audio element. Part 2 Your browser does not support the audio element. Summary A franchise recently published an article t... Procurement Aug 10, 2023
Understanding fileless ransomware and mitigation techniques Listen to Felicia's podcast episode Your browser does not support the audio element. Fileless Ransomware Ransomware and malware in general is harder to detect and defend against than ever before. Unde... Cybersecurity Security Strategy Aug 9, 2023
Criminal Fraud in IT Listen to Felicia's podcast episode Your browser does not support the audio element. Learn from the mistakes of others in order to prevent being the victim of criminal fraud in IT. Real life example o... Best Practices Cybersecurity Vendor Risk Management Aug 9, 2023
How to secure your backups from ransomware Listen to Felicia's podcast episode Your browser does not support the audio element. PETYA crypto ransomware overwrites MBR http://blog.trendmicro.com/trendlabs-security-intelligence/petya-crypto-rans... Backups Cybersecurity Ransomware Aug 9, 2023