The IT Blog for LA Businesses - Valuable Technology Insights

Blog Topics

What's A Password Management System and Why Do You Need One?

Simply put, one of the most impactful, yet least talked about, cybersecurity user habits is when users reuse the same password across multiple accounts.  In fact, more than eight out of 10 Americans are guilty of doing just this according to ...

Read More
Share:
BEFORE SPENDING MONEY ON SECURITY COMPLIANCE

A New Phishing Attack To Be Aware Of

How do you know if a website asking for your credentials is fake or legit to login to? Do you check first to see if the URL is accurate? Do you check first to make sure the URL is spelled right? (ie: faceb00k vs. facebook) Do you check first to make ...

Read More
Share:
5 ‘How-To’ Hints for Improving Technology for LA Investment Advisors-118807-edited

The Impact of Cybersecurity on Being a Trusted Advisor

I've been doing this a long time - 27 years and counting. And it still amazes me by the laissez faire attitudes I get when I discuss the value of securing a business' network. When I initially speak with most people, all too often we're discussing ...

Read More
Share:
ccpa-og

What the CCPA Means to Your Cybersecurity

2 018 was a pivotal year for those concerned with data privacy. Earlier this year the General Data Protection Regulation (GDPR) from the EU foreshadowed the coming shifts in the relationship between businesses, customers, and their data. Governments ...

Read More
Share:
Happy_Holidays

9 Ways to Stay Safe Online During the Holidays

With the holiday season fast upon us, it's the time of year for peace on earth and goodwill toward all.  Unfortunately, there are way too many who'll take advantage of this time of year and look for ways to scam, hack, or steal your information. As ...

Read More
Share:
8 Ways to Protect Yourself From Ransomware

8 Ways to Protect Your Law Firm From Ransomware

Ransomware. Even the mention of the word sends shivers down most IT support people's spines. The only thing worse than being told that you've been infected by a virus preventing you from getting to anything on your network, is being told that you ...

Read More
Share:
Paul Revere For Cyber Attack Warnings

4 Reasons We Need a Paul Revere For Cyber Attack Warnings

As our world has become increasingly digital and connected, it's becoming clearer and clearer that we need to take a more proactive approach to securing our digital information. To this end, the U.S. Congress recently approved the passing of the ...

Read More
Share:
How a Technology Checklist Takes You to the Next Level-751026-edited

How Technology Checklists Takes You to the Next Level

In one of my favorite books, “The Checklist Manifesto: How to Get Things Right,” surgeon and author Atul Gawande shares that one of the reasons professionals fail to accomplish what we set out to do is because of “necessary fallibility.” Because we ...

Read More
Share:
What Is a File-Sync System a-787787-edited

What's a File-Sync System and Why Does Securing It Matter?

Access to information and, thus, file sharing is a must these days in any modern organization. However, the type of file-sync system that you’ll want to use to make this information sharing a reality will primarily depend on the type of applications ...

Read More
Share:
How to Increase Your Application Security-989094-edited

How to Increase Your Application Security

Improving the cybersecurity of your registered investment advisor (RIA) firm should not be limited to protecting only the most critical systems. Improving application security to make systems as secure as possible is achieved by fortifying the ...

Read More
Share:
Surprising Password Guidelines from NIST You Should Know

Surprising Password Guidelines from NIST You Should Know

Think you’re up to speed on everything there is to know about managing passwords these days? What about staying compliant with password guidelines that are set by regulatory and non-regulatory bodies alike? It isn't easy, that's for sure. The ...

Read More
Share: