Discussion

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
OVERCOMING BARRIERS FOR BYOD

OVERCOMING BARRIERS FOR BYOD

Mobile devices make up about 60% of the endpoints in a company network. They also handle about 80% of the workload. But they’re often neglected when it comes to strong cybersecurity measures. read more

WHAT TO INCLUDE IN A YEAR-END TECHNOLOGY INFRASTRUCTURE REVIEW

WHAT TO INCLUDE IN A YEAR-END TECHNOLOGY INFRASTRUCTURE REVIEW

When the year is coming to a close, it’s the perfect time to plan for the future. Most businesses begin the year with the hope of growing and improving operations.

SMALL BUSINESSES ARE ATTACKED BY HACKERS 3X MORE THAN LARGER ONES

SMALL BUSINESSES ARE ATTACKED BY HACKERS 3X MORE THAN LARGER ONES

There are many reasons why hackers see small businesses as low-hanging fruit. And why they are becoming larger targets of hackers out to score a quick illicit buck.

HELPFUL TIPS FOR KEEPING YOUR SHARED CLOUD STORAGE ORGANIZED

HELPFUL TIPS FOR KEEPING YOUR SHARED CLOUD STORAGE ORGANIZED

When employees are sharing the same cloud space it’s hard to keep things organized. Storage can be difficult to keep efficient. Disorganized cloud storage systems lead to problems.

YOU NEED TO WATCH OUT FOR REPLY-CHAIN PHISHING ATTACKS

YOU NEED TO WATCH OUT FOR REPLY-CHAIN PHISHING ATTACKS

You don’t expect a phishing email tucked inside an ongoing email conversation between colleagues. Most people are expecting phishing to come in as a new message, not a message included in an existing reply chain

HOW USING THE SLAM METHOD CAN IMPROVE PHISHING DETECTION

HOW USING THE SLAM METHOD CAN IMPROVE PHISHING DETECTION

Give employees a “hook” they can use for memory retention by introducing the SLAM method of phishing identification.

HOW OFTEN DO YOU NEED TO TRAIN EMPLOYEES ON CYBERSECURITY AWARENESS?

HOW OFTEN DO YOU NEED TO TRAIN EMPLOYEES ON CYBERSECURITY AWARENESS?

People can’t change behaviors if training isn’t reinforced regularly. They can also easily forget what they’ve learned after several months go by. So, how often is often enough to improve your team’s cybersecurity awareness and cyber hygiene?

ARE TWO MONITORS REALLY MORE PRODUCTIVE THAN ONE?

ARE TWO MONITORS REALLY MORE PRODUCTIVE THAN ONE?

The biggest advantage to using a second monitor is that you can do more in less time because you’re not struggling to get to the windows you need when you need them.

WHICH FORM OF MFA IS THE MOST SECURE? WHICH IS THE MOST CONVENIENT?

WHICH FORM OF MFA IS THE MOST SECURE? WHICH IS THE MOST CONVENIENT?

Credential theft is now at an alltime high and is responsible for more data breaches than any other type of attack. With data and business processes now largely cloud-based, a user’s password is the quickest and easiest way to conduct many different types of dangerous activities.

DATA BACKUP IS NOT ENOUGH

DATA BACKUP IS NOT ENOUGH

The need to back up data has been around since floppy disks. Data loss happens due to viruses, hard drive crashes, and other mishaps. Most people using any type of technology have experienced data loss at least once.

4 PROVEN WAYS TO MITIGATE THE COSTS OF A DATA BREACH

4 PROVEN WAYS TO MITIGATE THE COSTS OF A DATA BREACH

Companies don’t need to resign themselves to the impending doom of a breach. There are some proven tactics they can take to mitigate the costs.

IS THAT A REAL TEXT FROM YOUR CEO? OR A SCAM?

IS THAT A REAL TEXT FROM YOUR CEO? OR A SCAM?

Without proper training, 32.4% of employees are prone to fall for a phishing scam. Variations of this scam are prevalent and can lead to significant financial losses, both personally and in the business.

INSIDER THREATS ARE GETTING MORE DANGEROUS! HERE’S HOW TO STOP THEM

INSIDER THREATS ARE GETTING MORE DANGEROUS! HERE’S HOW TO STOP THEM

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data via a login or authorized connection.

A GUIDE TO BETTER ENDPOINT PROTECTION

A GUIDE TO BETTER ENDPOINT PROTECTION

Endpoints are the collection of devices that make up your company’s network and IT infrastructure. Each of those devices is a chance for a hacker to penetrate a company’s defenses.

Helpdesk Tech Quiz

Helpdesk Tech Quiz

This is the Tech North Solutions Helpdesk Quiz. It is intended to be a basic assessment of your knowledge of IT concepts.

Disaster Strikes

Disaster Strikes

The Situation On a Monday morning in July of 2015, the phone rang at the Tech North office and a long-time client said those dreaded ...