In nearly any sized organization, Human Resources (HR) is responsible for onboarding and offboarding employees. This task is highly integrated with Information Technology (IT) teams nowadays, requiring user account creations or removals. This task is cumbersome as most organizations don’t just use one platform, but instead have quite a few in use for email, computer […]
Tag: awareness
What is a virtual cell phone number?
Have you heard of a P.O. Box? Well, it’s basically a mailbox that you can use without giving away your personal home address. Well, a virtual cell phone number is similar as it’s a way to communicate with you, without having your personal number. This virtual cell phone number (or virtual phone number) could be […]
Scam e-mails
It happens all the time, but it would never happen to you, right? Wrong. Scam e-mails are common, in fact according to EarthWeb, around 3.4 billion phishing emails are sent every day. Phishing is a generic term for attempted scams by bad actors. Scam e-mails can sometimes be challenging to spot, but we’ve put together […]
Secure e-mail
A common problem in modern computing, is communication. Many take communication for granted and assume that everything they say or type, is private. However, that’s not always the case. While many products and services are moving to secure and encrypted forms of communication, many things remain unsafe for the masses. While text messaging and voice […]
Holiday Tricks
This holiday season, don’t get caught off guard. Statistically, every year in November and December, the number of cyber attacks increase, exponentially. This holiday season, be aware and stay on the lookout for common tricks that criminals like to use. This holiday season, keep your eyes open for all the ways bad actors want to […]
The First Lesson
Hygiene. It sounds so simple and maybe even a little gross. However, just as you wash your body, hair, and hands to stay clean, your cyber hygiene needs regular attention as well. Cyber hygiene is the action or steps taken by a user to improve their device and/or online security, by performing one-time and recurring […]