10 Steps to Take Now To Be Certain Your Finances Are Protected Online

Seems like we've been inundated over the past year with rampant cybertheft. Unfortunately, in the world we live in, this is most likely the norm going forward and not just a blip on the radar. So, how can you stay protected online? While there is no way to absolutely, positively, 100% stay safe online, by taking these 9 steps, you will be as safe as possible.

9 Steps to Take Now To Be Certain Your Finances Are Protected Online

Seems like we've been inundated over the past year with rampant cybertheft. Unfortunately, in the world we live in, this is most likely the norm going forward and not just a blip on the radar. So, how can you stay protected online? While there is no way to absolutely, positively, 100% stay safe online, by taking these 9 steps, you will be as safe as possible.

How to Identify a Phishing Email

You have heard and read about security breaches and maybe even about phishing schemes (we have written about it multiple times). But no matter how much security you put in place, nothing is 100% guaranteed. Some threats will occasionally make their through to your inbox—even for the security experts like BSSi2. That is why your last line of defense is education and the “often not so common” common sense.

CyberSecurity for Your Android and Apple Devices

Often times I am asked “What do you do to secure your mobile phone or mobile device from threats?” This is an excellent question! With mobile infections and malware on the rise, 2.3 million new variants discovered in 2015 alone, having a good mobile policy for security and protection is a must!

If your company does not have a mobile policy that includes data, threat and theft protection it should! This article will cover, though, what an individual can do without a comprehensive corporate infrastructure behind them.

I Love Ransomware

We've Been Published!
Nick Espinosa recently wrote an article for SmartFile
I Love Ransomware
Before you go all torches and pitchforks on me, hear me out.

I hated writing this article. Truly. My industry is, at its core, a service industry. Overwhelmingly I meet people who go into IT service, support and cybersecurity that have a real desire to help others.

Sleeping with the Enemy: Why Microsoft Learned to Stop Worrying and Love Linux

We've Been Published!
Nick Espinosa recently wrote an article for SmartFile

Sleeping with the Enemy: Why Microsoft Learned to Stop Worrying and Love Linux
For years, I was fairly certain that there would be no way Microsoft would ever get into bed with Linux.

Ripping Off the Girl Scouts: 8 Steps for Evaluating Technology

We've Been Published!
Nick Espinosa recently wrote an article for SmartFile
Ripping Off the Girl Scouts: 8 Steps for Evaluating Technology
Until recently, I had no idea what a Thin Mint was. It’s kind of amazing that these delectable little cookies have escaped my grasp in the thirty-odd years I’ve been aware that cookies actually exist.

Prevent CEO Fraud by watching for these email Red Flags

CEO Fraud, also called Business Email Compromise, is the next cybercrime wave. The FBI recently warned that this has cost small and medium enterprise 1.2 billion dollars in damages between October 2013 and August 2015. Employees, especially CEOs and CFOs, have to be aware of the various techniques the scammers are using to trick them into wiring out large amounts of money.