Staying Safe On Video Conferences

Congratulations to everyone out there. You have most likely been working remotely for three weeks and hopefully settling into a new “normal” workday. Part of that new “normal” workday for most of us has been a plethora of video conferences. We have made a drastic change from audio-only conference calls to now getting to regularly see what people wear when they work from home. Also with this change, we are finding out that these applications may not have been as secure as we expected. While Zoom works on these issues fervently, here are a few tips to keep your meetings safer.

Read more

Microsoft 365 Q & A

As we have discussed over the past few weeks, Microsoft 365 and all that it includes can be quite confusing. It consists of all things Office 365 and so much more. We have given you verbal and visual descriptions of how the two products are similar and how they are different. We’ve broken down many of the essential terminologies as it is used and referenced. Now that you hopefully have a better understanding of the two Microsoft offerings let’s break down the barriers even farther and answer a few of the more commonly asked questions regarding Microsoft 365.

Read more

Bitdefender Box: Helping You Keep Your Smart Home Safe

With over 17 Billion connected devices worldwide, we all need some help keeping our families and homes safe from online attacks and intruders. Most of us have smart devices throughout our home, and many times we forget that these devices can be a front door to cyberattacks. Bitdefender box is the brute security guard we all need for our homes.

Read more

Microsoft Is Adding Even More Security

 

As was discussed last week, Microsoft Ignite was two weeks ago in Orlando, Florida. Like past years there were some exciting announcements. In last week’s blog, we touched on Project Cortex and what benefits it will add to an organization’s entire ecosystem. Another integral set of announcements at Ignite 2019 revolved around security. These announcements encompass multiple facets including, multi-point authentication, Enhancements to Azure, Endpoint protection, Firewalls, Application Guards, Compliance, and Insider Threat enhancements and will all be important against fighting cybersecurity threats. The focus this week is on Insider threat enhancements, for as we have discussed previously, your security is nothing without having a competent inside frontline.

Read more

October Is Not Just For Trick Or Treating; It's For CyberSecurity

It seems only appropriate that October is National Cybersecurity Awareness Month (NCSAM). The month where we have traditionally tried to scare the pants off each other, we now place a focus on real-life terror! Cyberattacks are real and are happening everywhere. There are all types of attacks, and individuals and businesses are all at risk! Education is the frontline to keep yourself and your business safe. This month there is a unique collaboration between the Government and Industry to ensure all Americans have the resources to learn how to be safer and more secure online.

Read more

Block Your Time to Help Block a Breach

We have spent the past few weeks focusing on security awareness training. We touched on what it is and why it is crucial. Now comes the step for action. For you and your employees to be the strongest first line of defense, you must make time for security awareness training. For as we have reiterated over and over, 95% of breaches are the cause of employee error. So the training is obviously necessary, so now time is the only barrier.

Read more

Why is Security Awareness Training Necessary?

Last week’s blog, we discussed Security Awareness training. We delved into what it is and what precisely we offer at Pendello Solutions. Our goal this week is to give you some significant numbers to paint a vivid picture of why Security Awareness training is so necessary. In this day and age, Security Awareness training is something that can keep your hard-earned business as safe as possible from the devastating effects of a security breach.

Read more

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company