Sometimes technology can seem a little overwhelming. There’s always something new to learn! That’s why once a month we want to share ways you can improve your technology usage – always in a way that’s easy to understand.

What Devices Are Under Attack?
If you have an electronic device that either has an IP address or somehow communicates with another electronic device, then you have something that can potentially be hacked. And if it can potentially be hacked, then it has to be secured.

How Can Attackers Get In My Network?
There are lots of ways for an attacker to get into your network, but several common ways are used over and over by bad guys. Let’s briefly review the most common entry points.

Who Is Attacking My Network?
While there are several possible ways to group potential hackers, I like to categorize them based on their motivation for attacking a network. Using this basis, there are probably six different types of attackers that may be attacking your network.

Is My Network Really Under Attack?
Part of what makes the need for cybersecurity so hard to understand is that most of us really can’t “see” cyber attacks taking place against our network. But cyberattacks are real, and we need to be prepared for them to happen.

Data Protection: What Needs Protected And Why?
People are often amazed at the variety of data that needs protected. While not an exhaustive list, you will likely find that you need to protect these types of data…

Do you have a responsive website…or frustrated customers?
Your business has a website, but have you given any thought to how it looks on a smartphone or tablet? A responsive website will automatically resize your content to fit any screen size. No more scrolling around or zooming pages in and out.