Posts Tagged: Cyber Security
December 29, 2020 Cyber SecurityBy: Eric Woodard TechnologyBy: Eric Woodard
Five Reasons Multi-factor Authentication is a Must for 2021
Five Reasons Multi-factor Authentication is a Must for 2021 The dawn of the new year is a great time for new beginnings. For many small businesses, now is a perfect time to tackle some of…
December 16, 2020 CultureBy: Eric Woodard Cyber SecurityBy: Eric Woodard
Three Big Cyber Security Priorities for HR in 2021
Three Big Cyber Security Priorities for HR in 2021 It is often said that people are weakest link in cyber security. As such, cyber security should really be a collaborative effort between IT and HR….
October 30, 2020 CultureBy: Eric Woodard Cyber SecurityBy: Eric Woodard
3 Reasons Employees Fall for Phishing Attacks
3 Reasons Employees Fall for Phishing Attacks A phishing attack is one of the most common types of cyber security threats. Phishing is the use of bait information to trick the recipient into opening, clicking…
September 11, 2020 Cyber SecurityBy: Eric Woodard HardwareBy: Eric Woodard
Five Key Considerations for Work from Home Hardware
During the height of the COVID-19 pandemic, virtually every worker in America was forced to work from home. In the mad scramble to keep people productive, providing secure remote access from personal devices was a…
Four Kinds of Phishing Attacks (and what to do about it) A phishing attack is one of the most common types of cyber security threats. Phishing is the use of bait information to trick the…
Three Core Elements of Your Cyber Security Awareness Program Security awareness training is essential for organizations of all sizes. Human error remains the root cause of most major security incidents. Therefore, companies need to invest…
FBI Cyber Crime Briefing: Five Big Risks for Business Leaders Protek recently sponsored a special briefing from cyber security experts at the FBI. The event, Cyber Crime 101: FBI Cyber Security Webinar is available on-demand…
What is the NIST Cyber Security Framework? (And why it matters) Business leaders and managers should pay close attention to technical standards in various areas of their business, whether the standards cover manufacturing quality…
Five Most Common Security Recommendations from Microsoft Secure Score Microsoft Secure Score is a feature in Microsoft 365, which provides an overall measurement of an organization’s security posture. The higher the Secure Score, the better….
May 11, 2020 Cyber SecurityBy: Eric Woodard SoftwareBy: Eric Woodard TechnologyBy: Eric Woodard
Five Reasons You Need Next-Gen Anti-Virus
Five Reasons You Need Next-Gen Anti-Virus Attackers are constantly evolving and upgrading their programs and tools. Similar to how software programs are always updating, attackers need to change to continually find ways around road blocks…
Mobile Device Management: What is it and Why You Need it? Now more than ever, organizations must implement cyber security and corporate data protection for a broadly distributed workforce. During the COVID-19 pandemic, millions of…
March 30, 2020 Cyber SecurityBy: Eric Woodard SoftwareBy: Eric Woodard
What are Security Services and Why They Matter
What are Security Services and Why They Matter Our clients often ask, why do we need extra security services and software running on our firewall? Won’t the basic firewall suffice? What is a firewall? A…
March 17, 2020 Cyber SecurityBy: Eric Woodard HardwareBy: Eric Woodard SoftwareBy: Eric Woodard TechnologyBy: Eric Woodard
Six Reasons PC Setup Fees are a Win-Win
Six Reasons PC Setup Fees are a Win-Win We often get asked, why does Protek charge PC setup fees for new laptops and desktops? The short answer is, these fees make sense both for the…
January 23, 2019 Cyber SecurityBy: Eric Woodard
Cyber Security Mistakes Businesses Should Avoid
It’s well into the new year, and many of us have forgotten our New Years resolutions. Studies show about 2/3 of people actually stop doing their resolutions by February of any new year. Whether its…
December 24, 2018 Cyber SecurityBy: Eric Woodard
The Biggest Phishing Attacks Year to Date
Phishing is still a very successful way that cyber criminals are using to gain access to your computer and credentials. We can learn a lot from the attacks of 2018. It will not only help…