If you have employees working remotely, make sure you consider three things: 1) what they are connecting to back at the office, 2) what platforms, software and access they need when remote, and 3) what computer, other hardware and software platforms will be on their remote workstation.
Top 7 Recommendations for Setting Up Remote Workers
Topics: Security, SecureIT, Tech Tips, Work Remote, cybercrime
New Challenge, Life-long Passion Introducing Maggie Basgall
Many of you have had the opportunity to work with, listen to, or golf with Megan Keiswetter in the past. As Nex-Tech’s expert in all things marketing she did a great job representing the Nex-Tech Advertising Solutions team and we wish her well as she embarks on a new journey. Enter Maggie Basgall, who is taking over Megan’s role as Advertising Solutions Representative at Nex-Tech.
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
Cybersecurity—The #1 Threat Right Now and How Not to Fall For It
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
FCC Approves 988 as New Dialing Procedure to Reach National Suicide Prevention Lifeline
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
Kari's Law and Baum's Act. How Will it Affect my Business?
As some business owners and technology professionals may know, in February of 2018, President Donald J. Trump signed into law two statutes intended to improve emergency calling situations. These laws took effect on February 16, 2020, and may require changes and enhancements to customer's telephone systems and/or services.
Here are the details you need to know.
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
How to Assess Physical Risk to Your Business—Five Steps to Get You Started
Let’s talk security. It’s everywhere, whether your business has 5 or 500 employees: encryption for your emails, surveillance cameras, or all the cloud services requiring multi-factor authentication. IT departments can’t get around it anymore, but it’s still a tough and complex conversation, especially when budget time comes.
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
Topics: Advertising Solutions, Cloud phone, Cybersecurity, Security, Business, SecureIT, Tech Tips, Communication, cybercrime, Phishing
Funny Memes or Phishing, Identity Theft and Exploitation?
The article Funny Memes or Phishing, Identity Theft and Exploitation? was published online by TK Business Magazine, Topeka, on April 30, 2020.
We have all noticed a surge in funny Facebook memes and games while sheltering in place during the COVID-19 pandemic. They are so clever and ridiculously tempting to click-and-share or click-and-play along. But here is the rub. There is an increased likelihood that clicking, playing, and entering information really just opens the door wide open for cyber predators to get your information. Read the full article.
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing
Cybercrime is everywhere. We know it and you know it, but deep down, many of us still think we’re either too small or unimportant to be a target. Think again. You were never safe from cyber criminals, but when the new year rolled into March and COVID-19 became the only news, your small business moved to the front of the cyber criminal’s hack-line.
Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing