Cole Informatics, LLC

Archive for December, 2016

IT Security Tip #26: Who really has access to what?

This may start off sounding like conspiracy theory stuff, but hang with me and I think I’ll dispel that notion pretty quickly. I’ve known for a very long time that if a thing is digital, we all assume what its ...

IT Security Tip #25: Using email to send attachments…sometimes its a bad idea

So you have a big file you need to get over to your client or the printer as soon as possible and you can’t get it to send via e-mail because the file is too big. What should you do? ...

IT Security Tip #24: How to keep staff from unintentionally causing a security breach…

With so many points of access, from cell phones to laptop and home computers, how can anyone hope to keep their network safe from hackers, viruses and other unintentional security breaches? The answer is not “one thing”, but a series ...

IT Security Tip #23: If you’ve ever said this, you’re ASKING to be hacked!

Want to know what every hacker hopes you believe? “We’re small, nobody wants to hack us.” This is the #1 reason why people (companies) get hacked. They dismiss the importance of IT security because they’re’ only a small business. And ...

IT Security Tip #22: The #1 Threat to Your Security Is…

YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without ...

IT Security Tip #21: 3 Tips to Keep Cloud Data Safe

If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but ...

IT Security Tip #20: The Gmail Scam That Surprised Me Too!

People are so very clever! Criminals tend to be people, so by default, criminals tend also to be clever! Here’s a scam that you may not have heard of, but you’re very vulnerable to it. This may help you avoid ...

IT Security Tip #19: A WARNING if you handle, process or store client credit cards

If you handle, process or store credit cards in any manner, you are required to comply with PCI DSS, or Payment Card Industry Data Security Standards. This is a set of LEGAL requirements you must abide by to help maintain ...

IT Security Tip #18: Your firewall is USELESS unless…

This is some basic-business-101…something you need to know, but we’ll be slightly geeky for a second or two. First of all you need to know what a router is. A router is simply a device that connects 2 networks. Your ...

IT Security Tip #17: Don’t JUST close your browser!

When online accessing a banking site or any other application containing sensitive data, make sure you log out of the site and THEN close your browser. If you simply close your browser, some of the session information that a hacker ...

Contact

Cole Informatics, LLCCole Informatics, LLC Logo $$$