Cybersecurity Tips – Week 5

October 28: The First Step in Protecting a Business from Cyber Threats Is to Identify the “Crown Jewels” of Your Business – Those Assets and Systems That Are Critical to Your Business. Crown jewels are the data without which your business would have difficulty operating and/or the information that could be a high-value target for…

Cybersecurity Tips – Week 4

October 21: Use Encryption to Protect Data and Minimize Breaches We produce and consume an insane amount of data each day. Any piece of data that you fail to secure can be used against you by cybercriminals. Learn how to protect your digital information by using encryption.     October 22: Employees Are One of…

Trends in Cybersecurity and Cyber Protection

> Trends in Cybersecurity and Cyber Protection > Whose Responsibility Is Office 365 Backups? > Toolkit: 31 Cybersecurity Tips > Spring Institute’s 5th Annual Spring Intercultural Champion Award Trends in Cybersecurity and Cyber Protection Earlier this month, Peter and Shawn went to the Acronis Global Cyber Summit in Florida. They learned the latest trends in…

Cybersecurity Tips – Week 3

October 14: Beware of Malvertising Malware + advertising = malvertising. Malvertising explained, plus 4 tips how to protect yourself against it.       October 15: Work With a Trusted IT Vendor           To be cybersmart also means working with the right IT partner: > Someone who undertands your needs and…

Cybercrime and You

> Cybercrime and You > Your Security Awareness Training > Essential, Non-Negotiable Tech Tools for Small Business > What Does Multi-Factor Authentication Actually Mean? > Peter’s Bucket List Dive Trip to Indonesia Cybercrime and You > How data breaches happen > The personal impact of cybercrime > The threat in your pocket Learn more about…