Who is Your Security Super Hero?
The three lines of defense you need to protect your business IT. In many ways, IT security is a numbers game. As an IT provider, our tools and strategies have to get it right hundreds if not thousands of times…
The three lines of defense you need to protect your business IT. In many ways, IT security is a numbers game. As an IT provider, our tools and strategies have to get it right hundreds if not thousands of times…
I wanted to share a story from this week to help your company improve service in working from home arrangements. I was meeting with a group of business owners with our local chamber of commerce, and we were discussing the…
I recently wrote an article for TechTarget, an online publication for the tech community. While the target audience is tech professionals, non-techies will still learn several important things about password practices. A two-pronged password security model for channel partners (techtarget.com)
In addition to the usual tips for buying computers for your business, there is one more very important tip I have for you. But first, the usual tips: Purchase business-class computers, not from (insert big-box, chain retailer here). There is…
At Skyline IT Management. We like to help you work better with technology. In this video Diana shows you how to manage your Windows notifications so you will only get the ones you want when you want them. https://youtu.be/GuaqOhCOUM0
No matter the size of your organization, there are pain points associated with properly securing your IT infrastructure. Unfortunately, there are bad actors that make security necessary. As if it isn't difficult enough to keep up with passwords (we can…
Take 2️⃣! I forgot to remove my 👓 and the glare was so bad that I had to redo this live video. 🤦🏻♀️ So not only do you get a Tech Term, you get a Tech Tip for recording video…
It's always nice to understand yet another Tech acronym, but knowing about URL's, can help you use the internet more safely and effectively as well. https://www.youtube.com/watch?v=SrRy3sgwoJ8
In today's Tech Term Tuesday, Diana discusses REDUNDANCY. Any business continuity plan must include plans for redundancy in key areas. Skyline IT Management can assist you in developing and implementing your business continuity plan. Contact us to have a free network…
Below is an example of a sextortion email. One of my client's received it this morning. These types of emails (or sometimes letters) are so effective because the criminal provides real information. The bad actors typically purchase personally identifiable information…