Understanding fileless ransomware and mitigation techniques Listen to Felicia's podcast episode Your browser does not support the audio element. Listen to Felicia's podcast episode Your browser does not support the audio element. Fileless Ransomware Ransomware... Cybersecurity Security Strategy Aug 9, 2023 Educational Articles
Criminal Fraud in IT Listen to Felicia's podcast episode Your browser does not support the audio element. Listen to Felicia's podcast episode Your browser does not support the audio element. Learn from the mistakes of oth... Best Practices Cybersecurity Vendor Risk Management Aug 9, 2023 Educational Articles
How to secure your backups from ransomware Listen to Felicia's podcast episode Your browser does not support the audio element. Listen to Felicia's podcast episode Your browser does not support the audio element. PETYA crypto ransomware overwr... Backups Cybersecurity Ransomware Aug 9, 2023 Educational Articles
Why are SOHO Routers Insufficient? There has been a lot of talk in the news lately about the inadequacy of SOHO routers, and I couldn't agree more. For more than ten years, I have been advocating the use of real, XTM (extensible threat... Hardware Router Aug 8, 2023 Educational Articles
Understanding Security Appliances What is a security appliance A security appliance is a device that protects the perimeter and the inside of your network. The perimeter is secured because the security appliance is between the interne... Cybersecurity Firewall Hardware Router Aug 8, 2023 Educational Articles
Why We Must Block Advertisements Blocking advertisements specifically and by category can save your computer from getting infected or otherwise hacked. I have been talking about this fact for years and have been actively blocking adv... Best Practices Cybersecurity Data Privacy Aug 8, 2023 Educational Articles
Computer Security & Maintenance Self-Assessment The following is a computer systems security and maintenance self-assessment that organizations of all sizes can use to test their overall security strategy. Most of this list is also applicable to re... Assessment Cybersecurity Aug 8, 2023 Educational Articles
Expected IT Hardware LifeCycle Here's an in-depth exploration of expected IT hardware life, leasing IT hardware, and budget planning for hardware replacement. Question posed by reader Amanda: I am better trying to understand the ac... Asset Management Hardware Aug 2, 2023 Educational Articles
YubiKey with Password Safe This article is all about how to enhance an already great password management tool with two-factor authentication. Authentication concepts Single-factor authentication Single-factor authentication is ... MFA Password Security Aug 2, 2023 Educational Articles
A Guide to Passwords and Password Security What is a password, exactly? A password is a string of characters that you give to verify that you are you when you log into a computer system. On most systems, a password is between 6 and 8 character... Best Practices Password Security Productivity Aug 2, 2023 Educational Articles
Document Retention Guidelines How long should you keep financial records? The list below can help you determine how long to keep documentation. Be sure to properly destroy any documentation with personally identifiable information... Best Practices Compliance Data Privacy Retention Aug 1, 2023 Educational Articles
Custom Cybersecurity Training Talk to us at QPC Security to learn more about how we can help keep your team aware of cybersecurity trends, best practices, do's and don'ts.... Awareness Cybersecurity Security Training Jul 4, 2023 QPC Services