Category: Security-cybersecurity

What's Coming and How to Prepare | Mytech's 2022 IT Forecast

Modern IT is constantly changing: every year brings new standards and threats. The sooner you start preparing for what’s on the horizon, the less
Read More »

Psychological Cybercrime | 3 Questions to Prevent Social Engineering Attacks

Not every attack on your organization’s network is a poorly spelled scam email. Sometimes the impersonations are clever, polished, and personally
Read More »

It’s a Net, not a Harpoon | Why Ransomware Threatens Even the Smallest Businesses

 
Read More »

Navigating Remote Medical Admin | Embracing the Future of the Medical Office

Last year, many healthcare admin teams transitioned to remote work quickly, with little structure or planning. These ad hoc remote solutions kept
Read More »

Simple, Efficient, and Safe | Password Best Practices and Multi-Factor Authentication

Passwords are hard. They’re hard to remember, hard to create, hard to use. We’ve talked before about how a password manager can help your
Read More »

Security Alert: Critical Vulnerability in Microsoft Exchange

Microsoft recently announced the discovery of a critical exploit in its Exchange Server products: these vulnerabilities are simple for attackers of
Read More »

Catching a Phish | Simple Tips & Tricks to Keep Yourself Secure

Phishing attacks and spoofed email scams aren’t going away anytime soon – last year, they were responsible for 94% of successful malware
Read More »

Stop Using Internet Explorer

After 25 years, Internet Explorer is officially on its way out. Some end-of-life changes, like removing Microsoft Teams, have already
Read More »

Security Alert: Sophisticated Cybersecurity Attacks on US Healthcare Industry

The FBI, the Department of Homeland Security, and (unusually) the Department of Health and Human Services recently released a joint advisory warning
Read More »

A Single, Digital Keyring | Why and How to Implement a Password Vault

It’s time to delete that “passwords.xlsx” file on your corporate server or personal laptop. There’s no place in today’s threat landscape for
Read More »