New Year’s Resolution: Do a network security audit

One step in the network security cycle you should never skip is a security audit — doing so puts your business at risk of cyberattacks and data loss. Read on to understand how security audits can make or break your system integrity. Auditing and the security strategy Audits are necessary to maintain system integrity and […]

Curbing your Risk Appetite in the New Year

The holidays are behind us now, and many of us have made (and possibly broken) resolutions to reign in our appetites and make better decisions regarding our personal health and fitness. This New Year is also a great time to assess your company’s IT fitness, curb your “Risk Appetite,” and resolve to tighten up loose cyber security controls.

Two-step and two-factor authentication: What’s the difference?

Every business should have a strong cybersecurity posture to keep cybercriminals from infiltrating their network. One way to do this is by implementing a strict authentication process using two-step or two-factor authentication. These two processes are so similar that many confuse one with the other.

Cybersecurity: It’s time to make this a priority

With so much going on with ransomware and data breaches, RESULTS Technology has decided to focus yet another monthly newsletter solely on cybersecurity education. At the time of this writing, there are at least 3 high-profile cybersecurity incidents in the news, including attacks on hospitals, retailers, and political groups.

Webinar: Cybersecurity for businesses with remote employees

Join RESULTS Technology for a Small Business Webinar as we present Cyber Security for businesses with remote employees. We will discuss why a secure remote connection is important, the types of remote connections, safety requirements for remote connections and the risk levels associated with each.

Now is the time to implement multi-factor authentication

Cyber attacks are not slowing down. And with more and more people accessing company networks remotely, the problem is only getting worse. All it takes is one compromised credential or legacy application to cause a data breach. Now is the time to step up your security.

Risk Levels of Various Remote Access Methods

The pandemic has forced many of us to implement work from home procedures. But what are the risks associated with permitting network access from outside of the secure perimeter of your company's internal network? To keep your business safe, make sure you have at least the minimum security measures in place.

Surefire ways to protect your email account

If you think your email is safe from hackers, think again. A lack of sufficient email security protocols can lead to data theft, unauthorized access to sensitive information, and successful malware attacks. Here are some tips to secure your email account from unwanted intruders and the many troubles that come with them.

5 Tips for protecting your network

If ransomware can happen to Garmin, it can happen to anyone. In a time when a large part of the population is working from home, how can you be sure your network is completely hacker-safe? As a business owner, you can’t afford a data breach, as it could cost you your clients and reputation.