Security Admin Advice

Home/Expert Advice/Security Admin




Security admin posts

January 6, 2019

Crypto Virus

The Crypto Virus has gained some fame over the last several years as one of the most detrimental viruses to businesses. So what is it? How can you make sure your business does not suffer from this virus? And is there any recovery if you do manage to get such a detrimental virus?


December 2, 2018

Virtual Private Networks

Perhaps you’ve heard the term VPN (Virtual Private Network) before. As the technical world grows they seem to be growing in popularity. But what is a VPN, exactly? What does it do? When should you use a VPN? And does it really keep your network more secure? Who benefits from using a VPN? Is there anything an end user needs to watch out for when using a VPN?


October 7, 2018

Hard Drive Recovery

You go into your office Monday morning and boot up your computer. Your computer shows BIOS settings before announcing “operating system not found”. What happened to your hard drive? Are your files safe? How do you get them back?


September 2, 2018

Network Security - An Overview

Network security is undoubtedly something you’ve heard before, even if it’s something you haven’t given much thought to. If you’re in the business world, however, it does deserve some attention. Network security is defined as “protection of the access to files and directories in a computer network against hacking, misuse, and unauthorized changes to the system”. In other words, network security protects against data theft and misuse, two huge issues when dealing with sensitive data from your clients and customers. With the continuous and needed use of the internet...


August 5, 2018

Passwords

In today’s world technology is key. In many cases the user accesses this technology through the use of passwords. Especially with business applications and storage moving to cloud-based systems, passwords are more important than ever. But how do they work and what makes a strong password?


July 02, 2018

Wireless Security

You just got a new wireless device for your office. Now all you have to do is set it up. Should be as simple as plugging in a few cords. But then you get around to setting up your new wireless network, and the router asks what protocol you would like the signal encrypted in. Over the years the options have grown, and they haven’t gotten any clearer on what, exactly, the best encryption method is.