Credential Security is Essential when using Collaboration Platforms

Credential Security is Essential when using Collaboration Platforms

Credential Security is Essential when using Collaboration Platforms Microsoft teams gained popularity as a collaboration platform to use as you telecommute to the office during this pandemic. As part of this platform, Teams utilize some automated notifications. Well,...
Pawned Accounts

Pawned Accounts

Pawned Accounts Hi. Craig Peterson here with a blink into the stolen account business, also known as “Pwning.” [Prounced “poned” as in p-owned]     Pwned means that your account has been the victim of a data breach. Your username and password have been stolen from a...
Hijacked Routers – Securing Them Requires Password Reset

Hijacked Routers – Securing Them Requires Password Reset

Hijacked Routers – Securing Them Requires Password Reset Hackers have found a way to hijack user accounts and change the user settings on Linksys routers that use Smart WiFi accounts. When this is done users are now redirected them to malware sites. The Smart...
All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not.  Companies who continue to believe that they are not technology companies...

Technology Can Only Protect You So Much — Then Other Tactics are Needed

Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...