The IT Support Education Center
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
Millions of Americans began working from home for the first time this March. While some companies had the ability to provide laptops or send office desktops home with them, many more required workers to use personal computers and might have inadvertently created a security vulnerability because their computers are still running Windows 7. The process of loading company software onto so many machines left the operating systems as an afterthought. However, support for Windows 7 ended January 14 and your company is facing major risks if it's still in use, even if you have antivirus and a firewall.
People don't really know how their cyber security skills are going to measure up until they've tried them. Everyone would prefer never having to face a real-life cyber security incident. It's better if they can try out their skills on simulated threats. They can make mistakes without suffering anything worse than embarrassment. The lessons they learn will help them to deal with real threats when they happen.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
The month of April has been filled with web meetings and uncertainty. While we've been advancing our video skills more than we ever thought possible, we’ve also been figuring out how to maneuver through our new circumstances. Like many of you, I have been working hard on getting paperwork together and submitting applications for the Payroll Protection Program.
When Boris Johnson, Prime Minister of the UK, sent out a tweet that included his computer screen showing his first cabinet meeting on Zoom, little did he know that he was helping hackers find their way into his meeting. His monitor clearly showed the meeting ID, and sharing it with the whole world on social media was like giving hackers a key to their conference room.
Welcome back to the second half of our two-part article on the top network security threats of 2020. If you haven't seen part one, jump back to the beginning before diving into part two.
I don’t even know where to start. If you’d have told me two months ago that we’d be debating over which businesses are “essential” and that millions of Americans would be sent home to work overnight, I would’ve told you you’re crazy. But here we are.
Now that you're working from home, there are a few security best practices to follow to help make sure you and your company are protected from cyber security threats. For example, have you thought about the security of your home network with all of your "things" connected to it? Don't forget that working securely has as much to do with your actions as it does with your IT environment, so don't let your new work location let down your guard.
During these unprecedented times, many companies are now being challenged to deliver their products and/or services, perhaps using new (and as yet, untested) mechanisms to do so. While some businesses have been forced to close their doors, those who have the advantage of staying open and allowing staff to work from a remote location can't ignore the security implications that go along with having less control over their corporate business and technological environment.
On March 18, 2020, the World Health Organization reported 207,855 cases of COVID-19 worldwide and 8,648 deaths from this virus. The pandemic has spread to 166 countries and territories, which is almost everywhere in the world. The recommended solution for businesses, schools, religious institutions, public agencies, and non-profits is the same: start practicing social distancing as soon as possible, and that means that many businesses have had to send employees to work from home.
If there's anything the last 20 years has shown us, it's that data security is paramount in modern business. Every year, the war rages on between hacker voraciousness and IT admin ingenuity. Every year, IT professionals invent new ways to stop hackers, and hackers find new weaknesses to exploit. In 2020, every business should be preparing for this year's wave of network security risks and the breaches of those brands who fall in the battle.