How to secure your backups from ransomware Listen to Felicia's podcast episode Your browser does not support the audio element. Listen to Felicia's podcast episode Your browser does not support the audio element. PETYA crypto ransomware overwr... Backups Cybersecurity Ransomware Aug 9, 2023 Educational Articles
Leaving Computers On All The Time Turn off, or not? I was recently asked the following question. "I say that leaving my computer on overnight does not expose it to hacking, but some disagree with me. (You advised me to leave it on as ... Best Practices Hardware Maintenance Aug 8, 2023 Educational Articles
Why are SOHO Routers Insufficient? There has been a lot of talk in the news lately about the inadequacy of SOHO routers, and I couldn't agree more. For more than ten years, I have been advocating the use of real, XTM (extensible threat... Hardware Router Aug 8, 2023 Educational Articles
Understanding Security Appliances What is a security appliance A security appliance is a device that protects the perimeter and the inside of your network. The perimeter is secured because the security appliance is between the interne... Cybersecurity Firewall Hardware Router Aug 8, 2023 Educational Articles
Computer Security & Maintenance Self-Assessment The following is a computer systems security and maintenance self-assessment that organizations of all sizes can use to test their overall security strategy. Most of this list is also applicable to re... Assessment Cybersecurity Aug 8, 2023 Educational Articles
Expected IT Hardware LifeCycle Here's an in-depth exploration of expected IT hardware life, leasing IT hardware, and budget planning for hardware replacement. Question posed by reader Amanda: I am better trying to understand the ac... Asset Management Hardware Aug 2, 2023 Educational Articles
YubiKey with Password Safe This article is all about how to enhance an already great password management tool with two-factor authentication. Authentication concepts Single-factor authentication Single-factor authentication is ... MFA Password Security Aug 2, 2023 Educational Articles
Use TraceRT for WAN Performance Optimization This article will help network administrators determine the best DNS server settings to use for WAN lookup settings inside of a perimeter security appliance. The DNS server settings discussed here are... Best Practices Networking Aug 2, 2023 Educational Articles
Keyboard Shortcuts Keyboard shortcuts can save you time and make you more efficient with your computer. Here are some common keyboard shortcuts. Most Windows applications Type To Get Ctrl + S Save Ctrl + Z Undo Ctrl + X... Productivity Aug 2, 2023 Educational Articles
A Guide to Passwords and Password Security What is a password, exactly? A password is a string of characters that you give to verify that you are you when you log into a computer system. On most systems, a password is between 6 and 8 character... Best Practices Password Security Productivity Aug 2, 2023 Educational Articles
Custom Cybersecurity Training Talk to us at QPC Security to learn more about how we can help keep your team aware of cybersecurity trends, best practices, do's and don'ts.... Awareness Cybersecurity Security Training Jul 4, 2023 QPC Services