Dec 5, 2024 | IT Cybersecurity
Cybercriminals are always looking for ways to make their scams more convincing, and a persistent email scam known as “sextortion” has taken a more personal turn. This scam, which falsely claims hackers have footage of you in compromising situations, has now added a...
Nov 12, 2024 | IT Cybersecurity
Essential Incident Response Guide for CPAs Accounting firms are high-value targets for cyberattacks due to the sensitive financial data they handle. A breach in Microsoft 365 (M365) can compromise client information, disrupt operations, and damage your reputation....
Sep 11, 2024 | IT Cybersecurity
When Sensitive Data is Exposed Breaking Down the Breach https://www.wingswept.com/wp-content/uploads/2024/09/BDTB-When-Sensitive-Data-is-Exposed.mp3 What Happened Why It Happened Prevention Key Insights Welcome to another edition of our “Breaking Down the Breach”...
Jul 8, 2024 | IT Cybersecurity
CEO Compromise: Breaking Down the Breach Welcome to the third edition of the “Breaking Down the Breach” series. Today, we’ll discuss a CEO who fell victim to a cyber-attack, highlighting that even the highest-ranking officials are not immune. This series underscores...
Jun 6, 2024 | IT Cybersecurity
Welcome to the second edition of the “Breaking Down the Breach” series. Today, we’ll discussa medium-sized company that never expected to be the target of a cyber-attack. This serieshighlights how many companies only focus on cybersecurity after an...
Mar 12, 2024 | IT Cybersecurity
This series delves into real-life cybersecurity incidents encountered by small businesses that never imagined they’d be targeted. We uncover the specific methods by which breaches occurred, what resulting consequences the business faced, and most importantly,...
Jan 22, 2024 | IT Cybersecurity
Ghost users, commonly referred to as “ghost accounts,” are active accounts tied to former employees on a corporate network. Despite their departure from the company, these accounts remain accessible, presenting security and operational challenges that...
Oct 10, 2023 | IT Cybersecurity
Over the past 2 months, we hosted client forums about the latest cybersecurity threats and how to stay ahead of the curve when it comes to safeguarding your business. The cybersecurity trends for 2023 are optimizations of past threats. Join us as we navigate this...
Sep 28, 2023 | IT Cybersecurity
Security Information and Event Management (SIEM) is a security solution that helps organizations detect, investigate, and respond to security threats. A SIEM system is a security solution that continuously monitors your network for threats. It collects logs and...
Aug 24, 2023 | IT Cybersecurity, Technology Tips
Are you tired of getting spam emails? If so, you’re not alone. Millions of people receive spam emails every day. These intrusions can be more than bothersome; they can pose genuine threats. Here is how to stop spam emails. 5 Spam Countermeasures 1....
Aug 3, 2023 | IT Cybersecurity
As the digital landscape evolves, so do the threats that businesses face in the form of cybercrime. The days of relying solely on preventive measures to safeguard your network and data are long gone. With the surge in ransomware attacks, business email compromise, and...
Jun 30, 2023 | IT Cybersecurity, Technology Tips
In today’s high-frequency cyber-attack landscape, protecting your passwords is paramount for strong cyber security. Recent concerns and data breaches have brought password managers into the spotlight. LastPass, a popular password manager, faced scrutiny due to a...
Jun 15, 2023 | IT Cybersecurity
Phishing is a type of online scam where cybercriminals send fake emails, text messages, or phone calls that look like they’re from legitimate sources like banks or government agencies. Their goal is to trick you into sharing personal information such as your...
Mar 8, 2023 | IT Cybersecurity, Managed IT Service, Technology Tips
Does your organization have backups? Many may quickly respond with an affirmative response, but they may subscribe to myths about backups. Someone may say, “Back up their critical infrastructure, check that box, and move on.” When choosing a backup...
Dec 19, 2022 | IT Cybersecurity
The weakest link in your information security chain is your users. Your employees, your team, and your family are the primary targets of cyberattacks. They are the ones who are most likely to click on a malicious link, open an infected attachment, or give away their...
Nov 30, 2022 | Business Tips, IT Cybersecurity
The increasing regulatory and cybersecurity compliance requirements for information technology have made it difficult for organizations to do business with government agencies. The federal government has been particularly focused on cybersecurity for nearly 20 years,...
Oct 3, 2022 | IT Cybersecurity, Technology Tips
The rise of ransomware attacks targeting small and medium businesses has made data security a top priority for IT leaders. While there are many security products available to protect and detect threats, one simple but often overlooked mitigation tactic is proper tech...
Aug 12, 2022 | IT Cybersecurity
Ransomware has emerged as one of the most pervasive and costly challenges in the world of cybercrime. With major companies like Nvidia, Toyota, and SpiceJet falling prey to ransomware attacks, the threat has escalated to new heights. Even entire countries, like Costa...
Jul 15, 2022 | IT Cybersecurity, Technology Tips
The Cost of Business Email Compromise In May of 2022, the FBI published a report stating that Business Email Compromises account for over $43 Billion in losses Internationally. In the “2022 State of Email Security Report” from Mimecast, a polling of 1400...
Aug 26, 2021 | IT Cybersecurity
As a business leader, it’s challenging to distinguish between significant security threats and those that are less likely to affect your organization. This is especially true nowadays, with frequent reminders about cybersecurity’s importance. While we...
Aug 10, 2021 | IT Cybersecurity
If you’ve been reading technology news lately, you’ve probably seen some sensational headlines about one of the recent ransomware attacks. What does it really mean for the average small or mid-size business? Ransomware is malware that locks your files away and...
Jul 28, 2021 | IT Cybersecurity
The expanding threat landscape is making ransomware one of the few bipartisan issues in Congress right now. But an FBI expert’s testimony proves there are still no easy answers. Here are the top cybersecurity stories for small and midsize business executives...
Jul 28, 2021 | IT Cybersecurity
The explosion of ransomware has many security experts arguing forcefully against a perimeter-only security model. These experts point out that this approach has led to cyberattacks that have caused billions of dollars of economic damage. But what is perimeter...
Jul 15, 2021 | IT Cybersecurity
Ransomware is still all over the place – attacks are up 62% globally and 158% in North America since 2019. But ransomware-only attacks have mostly been replaced by more sophisticated – and ruthless – attacks. In a traditional ransomware attack, a cyber criminal...
Jul 13, 2021 | IT Cybersecurity
Ransomware News: Early July had several cybersecurity events with big impacts on small and mid-sized businesses. Here are three you that should know about. REvil’s Kaseya Attack Hits Thousands of Businesses Worldwide, US Will Respond The biggest news story this week...
Jul 1, 2021 | IT Cybersecurity
The ever-changing IT environment has made it easier for malware to exist and thrive. In today’s world, businesses and individuals alike are constantly bombarded with new threats, making it more important than ever to be aware of the latest malware trends. Types...
Jun 28, 2021 | IT Cybersecurity
Congress continues to crawl towards new legislation to contain cybersecurity damage. Meanwhile, traditional antivirus techniques now miss most attacks, and Western Digital customers wake up to empty backup drives. Signature-Based Anti-Malware Tools Now Miss Most...
Jun 16, 2021 | IT Cybersecurity
It sounds bad. It is bad. But what is it? Doxing Doxing is shorthand for “dropping dox” (documents), a phrase invented by hackers in the 90s. Dropping dox means to publish embarrassing or incriminating documents about a person or company online. It’s normally done...
Jun 11, 2021 | IT Cybersecurity
Taking down corporate networks for cash is quickly becoming a dangerous career. Just last week, the FBI elevated ransomware to a threat level equivalent to terrorism. While that might make some people think twice about joining a cybercrime ring like REvil or...
Jun 10, 2021 | IT Cybersecurity
The first half of 2021 has been a dangerous time for business networks, and it’s not getting any better. In the last two weeks, 8.4 billion stolen passwords were posted online, a ransomware attack shut down 20% of US beef and pork slaughterhouses, and the White...
May 25, 2021 | IT Cybersecurity
Hackers have come up with some convincing new phishing attacks aimed at businesses, and they’ve moved from double to triple extortion by targeting individuals named in leak data. And just wait until you hear how long it takes them to target a vulnerability once it’s...
May 15, 2021 | IT Cybersecurity
If you manage a service business, you probably don’t spend much time thinking about your supply chain. But there’s one supply chain that every business needs to manage – data. Operations, sales, finance and HR departments all use different software to generate...
May 11, 2021 | IT Cybersecurity
We’ve all saved seemingly useless items only to later appreciate their value. In contrast, persistently retaining irrelevant things has limited impact. This tendency often delays decluttering, except for reality TV-level hoarding. However, the business data...
Apr 26, 2021 | IT Cybersecurity
This month’s cybersecurity news includes ransomware masquerading as a cease-and-desist letter, a hacked password manager, and the Department of Justice trying to slow down the unbridled growth of cybercrime. Legal Threats are the Latest Malware Ruse Microsoft...
Apr 20, 2021 | IT Cybersecurity
You may have read recently that federal officials are more worried than ever about the security of government contractors’ computer networks. That’s because government data and network security is at risk if contractors’ networks are breached. But why would...
Mar 24, 2021 | IT Cybersecurity
A few weeks ago, security experts revealed that a Chinese hacking group had compromised more than 30,000 US organizations since January by using a zero-day attack targeting on-site Exchange servers. The hackers also left behind an access portal allowing them to visit...
Mar 15, 2021 | IT Cybersecurity
In the past, we’ve emphasized the vital role of controlling data access. A single stolen password can grant cyber attackers entry to your network, underscoring the principle of least privilege. Additionally, neglecting to secure newly added network components is...
Mar 15, 2021 | IT Cybersecurity
Password policies are really important. Depending on the software being breached, a simple eight-character password (with no capitals or symbols) can be cracked in less than a second. Time limits on passwords are even more important. If you’re using the same...
Feb 26, 2021 | IT Cybersecurity
We’re over a month away from tax season, but that hasn’t stopped hackers from targeting companies’ 2020 QuickBooks data – attacks are up over 600%. Learn more about this and other February developments below. Tax Season Brings Malware Targeting QuickBooks The number...
Feb 12, 2021 | IT Cybersecurity
Cyberattacks keep CEOs, governments and IT professionals up at night. But the latest attack in Florida is especially hard to swallow. Hackers (Briefly) Poison Water Supply Remotely A worst-case scenario cyberattack was nearly executed earlier this month when a...
Feb 9, 2021 | Business Tips, IT Cybersecurity
Before 2020, many companies took a cybersecurity posture equivalent to buying a car with great brakes, headlights and wiper blades, but no seatbelts or airbags. Most small businesses were focused almost exclusively on preventing cyberattacks. Antivirus and...
Feb 9, 2021 | IT Cybersecurity
Russia’s SolarWinds hack in the fall of 2020 is shaping up to be the largest known theft of sensitive government information in history. Everyone knew the federal government’s outdated and poorly organized networks had security flaws. Across the federal government, IT...
Jan 26, 2021 | Business Tips, IT Cybersecurity
What is Cyber Insurance? A cyber insurance policy covers damage to you and/or damage to your clients and vendors from a cyberattack on your business. Although each policy is different, covered costs can include business interruption, data recovery, investigative...
Jan 26, 2021 | IT Cybersecurity
Cybercriminals and hackers have found a few new spins on old techniques to steal your data and your money. Here are some of the newest techniques, which are just surfacing in the past couple of weeks. Deceased Employee’s Account Hacked, More Than 100 Systems...
Jan 15, 2021 | IT Cybersecurity
You’ve probably heard about the recent SolarWinds hack, which exposed a tremendous amount of government and corporate data to Russian hackers. While the scale was shocking, the hack itself was not. Foreign countries are constantly looking for sensitive US government...
Jan 15, 2021 | IT Cybersecurity
So far, 2021 is starting much like 2020 ended in the world of cybersecurity – new techniques are constantly being devised by cybercriminals to earn higher payouts than ever. Here are two new techniques – and one very old one – to ring in the new year. Hackers...
Dec 23, 2020 | IT Cybersecurity
We hope you and your employees have a happy and safe Christmas holiday this year! With your help, your network can stay safe too – take care to avoid these malware schemes, which are circulating during the last two weeks of 2020. Web Browser Add-ons Are a Growing...
Dec 21, 2020 | IT Cybersecurity
One of the lessons of 2020 is that you can’t take things for granted. Among the most painful things that we’ve temporarily lost is the ability to trust those closest to us. It’s not that friends, family and co-workers want to hurt us – they don’t even know that they...
Dec 11, 2020 | IT Cybersecurity
We’re all looking for presents online right now, but the bad guys are looking for presence on your network. Here’s what’s happening in the world of cybersecurity in early December. Ransomware gangs are getting faster at encrypting networks. That will make them...
Dec 11, 2020 | IT Cybersecurity
When you’re hurriedly trying to find information on your network or install software on a PC, one thing you don’t want to see is “Access is Denied.” Why wouldn’t an owner, CEO, or senior executive’s credentials have access to everything on your organization’s...
Nov 24, 2020 | IT Cybersecurity
While many of us are gearing up for a (smaller than usual) Thanksgiving celebration, hackers are still targeting emails, passwords and even videoconferencing. Here’s what’s happening right now in the world of cybersecurity. Beware of “Site Notifications” – It seems...
Nov 20, 2020 | Business Tips, IT Cybersecurity
If you run a business, there’s a good chance that you are using a line-of-business (LOB) application – software built specifically for businesses in your industry to get things done. If you’re in a big industry, it’s probably made by a billion-dollar software...
Nov 18, 2020 | IT Cybersecurity
There are some very convincing fraudulent emails out there. We’ve talked about several of them – the one that pretended to be a cybersecurity training update, the one that uses a real Microsoft login prompt, and one that uses Google Forms to copy your bank login page...
Nov 12, 2020 | IT Cybersecurity
New data confirms that ransomware remains a major threat for small and mid-size businesses, and extortion was taken to a new level this month – here’s what’s happening in the cybersecurity world right now. Coveware Q3 2020 Report Details Ransomware Risks Ransomware...
Nov 12, 2020 | IT Cybersecurity
On the day of his assassination, Abraham Lincoln signed the act that created the Secret Service. It wasn’t created to protect presidents, however. It was created to combat counterfeiting – around one-third of all currency in the US was counterfeit in the 1860s. ...
Oct 16, 2020 | IT Cybersecurity
Have you been in a situation where you didn’t have access to your password for a website or app and couldn’t remember it? One of the most annoying things about this situation is when you guess incorrectly a few times and the account gets locked. Depending on which...
Oct 12, 2020 | IT Cybersecurity
If you received one of the “Nigerian Prince” scam emails in the earlier days of the internet, you may have been left wondering who exactly falls for those things. The story was implausible and the grammar was terrible. But the reality is that today’s scammers are...
Sep 16, 2020 | IT Cybersecurity
The safest way to survive in a big corporation is to always make the obvious choice. If you’re tasked with buying tablets for a division, always buy the iPad. If you choose iPads and they work poorly, nobody will give you too much grief for picking the obvious...
Sep 11, 2020 | IT Cybersecurity
Since COVID-19 started, 20% of companies have already been hit with a cyberattack. New types of attacks are hitting companies more quickly, avoiding detection from antivirus software. And a recent phishing campaign uses your own website against you. Here’s the...
Sep 8, 2020 | IT Cybersecurity
Earlier in the smartphone days, they didn’t all come with a built-in ‘flashlight’ feature. It was one of the easiest apps in the world to make – all it does is toggle your camera flash off and on – so it was quickly created by app developers and added to Google’s app...
Aug 25, 2020 | IT Cybersecurity
A cybersecurity training company gets educated. Most employees don’t get cybersecurity education. And over a hundred companies mined cryptocurrency for cybercriminals on their Amazon cloud servers . Here’s what’s happening in cybersecurity in the...
Aug 21, 2020 | IT Cybersecurity
According to ADT, around 20% of homes in the US have a home security system. Most of them probably value the system, even if half of them are trying to figure out how to get out of the long-term contract they signed. That 20% figure is about half as large as the 39%...
Aug 10, 2020 | IT Cybersecurity
Cybercriminals are getting smarter about who they’re targeting, how they’re getting into networks, what they’re threatening to do to businesses, and how much they’re charging. Meanwhile, employees are helping them into their employers’...
Jul 29, 2020 | IT Cybersecurity
The pandemic hasn’t slowed down cyber crime attacks – in fact, it’s made them more prevalent than ever. That’s because businesses are more reliant on their networks than ever with so many of their employees working from home. Here are some of...
Jul 29, 2020 | IT Cybersecurity
One of the many things people want to know after they suffer a ransomware attack is “how did they gain access to my network?” However it happened, it may have happened many months ago – and ransomware victims may have bigger problems than encrypted files. In many...
Jun 26, 2020 | IT Cybersecurity, Technology Tips
We’ve written before about the perils of data sprawl. Even in normal times, no single person at most companies can list all of the places where sensitive company data lives. Not only does this make it far more likely that your data will find its way into the wrong...
Jun 23, 2020 | IT Cybersecurity, Technology Tips
It would be an understatement to say the software-as-a-service (SaaS) model has become the dominant one in the software industry. This model (where you pay monthly or yearly for software instead of buying the license outright) is now being used primarily or...
Apr 20, 2020 | IT Cybersecurity
Have you ever been browsing Facebook and seen a quiz encouraging you to answer seemingly innocuous personal questions? Some people also create threads on Facebook or Twitter asking people to answer these questions or quizzes “for fun”: “Who was your first-grade...
Apr 1, 2020 | IT Cybersecurity
Whether you call it teleworking or remote work or work from home, more businesses than ever before are having to turn to it during the COVID-19 crisis. Unfortunately, many of those businesses were unprepared to make a quick transition to that way of work and are...
Feb 18, 2020 | IT Cybersecurity
Most businesses of any size have some level of network security in place, especially if they’re heavily regulated or retain sensitive customer data. That’s because most business owners know a fellow owner who has had to deal with the fallout of a business security...
Jan 31, 2020 | Business Tips, IT Cybersecurity
If you’ve ever searched on Google for a business, you’ve probably seen their business information show up to the right of the search results. As an example, searching for WingSwept returns the box below. GMB, a platform used by Google to display business information...
Jan 27, 2020 | IT Cybersecurity
Ransomware might not command the media attention it once did, but that’s not because it’s gotten any less dangerous or expensive. While it’s old news to much of the media, every day it becomes big news to thousands of small business owners. The financial threat is...
Jan 17, 2020 | IT Cybersecurity, Managed IT Service
It’s been all over the news this week that Windows 7 officially reached “end-of-life” on Tuesday. Of course, that doesn’t mean your computer isn’t going to turn on today if you’re running Windows 7. It also doesn’t mean that Microsoft stopped selling Windows 7 this...
Nov 25, 2019 | Business Tips, IT Cybersecurity, Managed IT Service
Who Provides IT Help to Businesses? If you have more than a handful of employees, the odds are good that you will have to turn to specialists to address your technology needs at some point. Depending on how extensive your technology needs are, you’ll likely solve...
Oct 14, 2019 | IT Cybersecurity
Password policies are often seen as a nuisance by both employees and employers. However, they are essential for maintaining a secure work environment. In this blog post, we will discuss the importance of strong password policies and how they can help your business...
Sep 17, 2019 | IT Cybersecurity, Managed IT Service
Just as Houston’s lack of zoning regulations has led to some incongruous juxtapositions, the lack of data zoning in many companies can lead to similar problems. While there is a great deal of value in allowing different departments to use the...
Aug 9, 2019 | IT Cybersecurity
In a recent interview with CBS, a security expert at IBM demonstrated the alarming ease with which she could gain access to sensitive information through social engineering. By simply posing as a friendly stranger, she was able to obtain the passwords of unsuspecting...
Jul 3, 2019 | IT Cybersecurity
In today’s volatile digital landscape, the threat of cyberattacks looms over businesses more than ever. From phishing scams to data breaches, the risk factors are diverse and constantly evolving. What’s often overlooked is the pivotal role employees play...
Jun 28, 2019 | IT Cybersecurity
This lady to the right is Martha Jean. She was probably well-liked at work. She probably went out of her way to make sure others felt like she was a competent, dependable co-worker. She didn’t want to raise any flags at the awning manufacturer that employed her,...
Jun 24, 2019 | IT Cybersecurity
Cyberattacks Caused By Off Autopilot People don’t trust much these days. Six in ten don’t trust Facebook at all. Forty-six percent don’t trust the press at all. In fact, fifty-two percent don’t even trust polls like the ones just referenced. Despite all this...
May 16, 2019 | IT Cybersecurity
Five years ago, cyberattacks were mostly targeted at large companies, where the huge payout was worth the effort. This is no longer true; between 60 and 70 percent of small and mid-sized businesses face cyberattacks each year. As ransomware becomes more pervasive...
Feb 14, 2019 | IT Cybersecurity
Who has access to sensitive files on your network? You’ve probably locked down sensitive files, such as HR and bookkeeping information, ensuring that only certain people can view them. But how about corporate strategy documents? Data about your clients? Your sales...
Sep 10, 2018 | IT Cybersecurity
For several years now, there have plenty of scary headlines out there referencing billions in losses due to ransomware. But are those losses real or estimated? How is ransomware being defined? And why do these stories always seem to be pushed by someone selling...
Aug 6, 2018 | IT Cybersecurity
Ransomware is still a threat, and CEOs need to do more to protect their companies Ransomware has had its ten minutes of fame. For a while there, it seemed like every technology article was about how ransomware was hitting another major company. Pretty soon, the media...
Jun 21, 2018 | IT Cybersecurity, Technology Tips
While all of the facts haven’t yet come to light, Tesla looks like it might be in a bad situation due to an employee’s actions. This employee (who was disgruntled, concerned, or both) claims to have provided outside sources with proof that the company has installed...
May 11, 2018 | IT Cybersecurity
We’ve talked about the dangers of CEO Fraud in the past. This fraud involves a criminal impersonating a company’s CEO. Often, the impersonator requests a transfer of money to complete a time-sensitive deal. These attacks are very different than the poorly-crafted...
Mar 26, 2018 | IT Cybersecurity
There’s been so much news about ransomware over the last couple of years that it’s easy to overlook it at this point. That doesn’t mean that the risk has died down any, however – Atlanta’s recent woes are yet another reminder that organizations of all sizes have to...
Aug 13, 2017 | IT Cybersecurity
Ransomware and other types of malware arrive on computer networks from several different sources. Some of it is downloaded via links in phishing emails, which are designed to look like they are legitimate but are not. Some links arrive through malicious websites or...
Jun 28, 2017 | IT Cybersecurity
Only a few weeks after the WannaCry ransomware attack, another one is rapidly affecting computers across the globe. This new ransomware, a variant of Petya, originated in Ukraine less than 24 hours ago and has already hit computers in more than 60 countries. Well...
Jun 8, 2017 | IT Cybersecurity
With so many people needing internet access today, there are plenty of businesses that are willing to offer public Wi-Fi in exchange for a bit of your time (and money). Millions of people use these networks every day, and while the vast majority of those connections...
May 12, 2017 | IT Cybersecurity
After years of promises by manufacturers, Internet of Things (IoT) device sales are increasing dramatically. IOT devices are internet connected devices that people don’t traditionally associate with the internet – TVs, thermostats, lightbulbs, coffeemakers, and...
May 5, 2017 | IT Cybersecurity
You’ve probably received plenty of spam emails from someone you’ve never met, asking you to click on a link. Clicking those links will install viruses or malware on your computer unless you have an antivirus program blocking that from happening. This process is...
Dec 26, 2016 | IT Cybersecurity
Experts recommend long passwords with uppercase and lowercase letters, preferably with a symbol or two. They recommend that each password be different from all of your other passwords, and that all of these passwords be changed regularly. While we’ve covered why all...
Oct 21, 2016 | IT Cybersecurity
Avoiding the Three Insider Threat Scenarios For all the time spent protecting networks against external threats, it will never prevent data theft. That’s because nearly half of all data breaches come from an insider threat – people inside your organization....
Jun 15, 2016 | IT Cybersecurity, Managed IT Service
At the farthest ends of the spectrum, Bring Your Own Device (BYOD) can be described as one of the most employee-friendly policies you can have or one of the biggest security risks you can take. For most small and medium-sized businesses a BYOD policy will fall closer...
May 10, 2016 | IT Cybersecurity
Email is one of the most important means of communication at work. You receive and open several email messages every day. But how often do you check to see if the email message is actually from your co-worker? What if I told you the next email your CEO sends you could...
Apr 19, 2016 | IT Cybersecurity
In cybersecurity, people are considered the weakest link. If your employees use the internet, you face the threat of your network being infected by ransomware. Ransomware is malware that can infect your personal files and folders through your email. It encrypts files...
Nov 20, 2012 | IT Cybersecurity, Technology Tips
In today’s interconnected world, social networking has become an integral part of our lives, allowing us to connect with friends, share our experiences, and stay updated on current events. However, as we navigate the digital landscape, it’s crucial to...
Jul 18, 2012 | IT Cybersecurity
Recently, there has been significant media coverage of LinkedIn passwords being compromised. The message below was taken directly from LinkedIn. It points out how you will know if you are one of the members with a compromised password and how to rectify. “We can...
May 31, 2011 | IT Cybersecurity
Ann Marie van den Hurk recently wrote an article, “Hacking happens, so be prepared”, about how information hacking can happen to anyone and does. People are hesitant to spend money in these economic times, but holding back on security for your network and data...
Dec 27, 2010 | IT Cybersecurity, Technology Tips
With technology becoming more readily available to everyone, password safety has never been more important. This article by PCWorld illustrates just how crucial proper password protection can be. Gawker Media is a widely known publication group that runs several blog...
Mar 24, 2010 | IT Cybersecurity, Technology Tips
Attention, WingSwept would like to encourage readers to follow these online safety tips, which will hopefully reduce the risk of falling victim of cybercrime especially among children and families. Online Computer Safety Tips for Young Children by Norton: Hot tip:...
Jan 14, 2010 | IT Cybersecurity
WingSwept’s IT experts offer businesses the chance to better understand their technology. How efficient is your network? Is your server and technology equipment holding you back? Are you on the brink of a computer crash? These are all easy questions to answer...
Dec 15, 2009 | IT Cybersecurity, Managed IT Service
Today’s economy has every business owner questioning their expenses and reducing the amount of risks they take, which is why data security is more important than ever. You may think this is only true for enterprise level companies that can afford expensive plans, but...
Nov 5, 2009 | IT Cybersecurity
CRN Magazine, in their September issue, examined the current state of technology, security solutions and what is to come. They rated the biggest security threats that will be facing customers in the next 12 to 18 months. The 10 Biggest Security Threats Are: 39.7%...