WHAT TO DO WHEN YOUR CREDENTIALS ARE FOUND ON THE DARK WEB

Sites are hacked every day. Your Information IS for sale on the DarkWeb.  It travels quickly across the world and is viewed by thousands in a weeks’ time[1].    Once on the internet, whether on the surface internet (what we know of as the internet) or on the deep/dark web, you cannot erase it.  Many evil things happen on the dark web, it’s not just about stolen credentials.  Drugs are sold; people are sold; counterfeit money is sold; access to your server is sold.   Your stolen PII / PHI can be

CMMC: You Might Not Realize the Impact on Your Business

Cybersecurity Maturity Model Certification (CMMC) The CMMC started within the Department of Defense (DoD) to reduce the theft of military intelligence, but as expected, it doesn’t look like it will be long before it spreads to other sectors. There’s interest in amending Sarbanes-Oxley to include CMMC, which will impact the financial sector.  Don’t fear this is just an additional burden – the CMMC model is set up to be clearer and easier to implement.  Standardization in security compliance is a win for businesses trying to juggle multiple requirements. Impact of

What Are the Most Common Network Security Threats to Watch Out For?

In the digital age, we do almost everything online or with help from technology. We rely on our devices for both personal and professional use — and we think nothing of entering our personal information into web portals. But while technology can provide us with ample convenience, it can also increase our privacy risks. You might depend on accessing digital data at work, but criminals are after that access, too. In order to prevent security breaches and data loss, you’ll want to have a full understanding of the network security

Welcome to another episode of Ask the Security Expert!

We have more questions for Joe about the security concerns of working from home.  To start with, how many AME employees are working from home, and what types of adjustments have you made from a technical/cybersecurity perspective?   We have almost 200 AME employees working from home.  Sixteen offices have a staff person present to receive shipments.  AME was well-positioned with laptops and secure connectivity to all of our applications (including our phone system) we need to provide 90% of our services remotely.  Our staff is fortunate to have home

Having that Difficult Conversation with your Family

The reality of working from home goes beyond business collaboration adjustments and the technical and workspace setup. The people who share your workspace also need to adjust to your new working arrangement. Suddenly working from home can inadvertently cause friction, aggravation, and even embarrassment during the workday. The best way to manage these situations is to get ahead of them and have an open, two-way conversation about needs and expectations. This is a sample conversation that can be adapted for your specific situation. While it might not directly apply to

How to Cause a Data Breach in 10 Easy Steps!

STEP 1: Make sure to click on every link, and download every attachment sent to you via email. On mobile, feel free to trust links sent to you in random text messages. STEP 2: Disable antivirus and other security apps on every device, especially your work computer. STEP 3: Ignore security policies. They’re more like suggestions than hard guidelines anyway. STEP 4: Plug in that random USB flash drive you found. It could have some good information on it! STEP 5: Feel free to download sensitive information to a personal

How to Engage your Unmotivated Users

As far as software is concerned, it’s safe to say that change is the new normal. Unfortunately, if there’s one thing people are bad at, it’s—you guessed it—change. You can have the best technology in the world, but if your users aren’t willing to change along with it, your investment may end up sitting on the shelf.   THE UNMOTIVATED MAJORITY 80% of users are skeptical of new software and reluctant to change. Successfully rolling out software is one thing, but getting users to adopt their productivity tools percentage embracing

SKYPE for Business is Going Away

Are you Ready? 5 Things You Will Love About Moving to Microsoft Teams Email will always be important, but when it comes to modern collaboration between teams, there’s a better way! Microsoft Teams is a chat-based collaboration hub that’s built on the principles and best practices of the modern workplace. Here are five ways Microsoft Teams will help you and your teamwork smarter together. LESS BACK AND FORTH Teams is a workspace that saves you from the scatterbrained norm. The average user works (or tries to work) with 10 desktop

Now is the Time for Success with a Remote Workforce

We offer a personalized approach to learning.  Each user creates a profile to identify their experience with Microsoft applications and their job characteristics, such as travel, work locations, involvement in management, activities, and type of devices used.   An individualized Skill Path makes it easy to access and complete training relevant to the user. Assigned courses with due dates and feedback on progress helps the user navigate their learning. Quick Long courses are difficult to add to your day and hard to take in.  Course videos are “bite-sized” and QuickStart

3 Ways IT Support Services Are Boosting the Growth of SMEs

If you’ve just started your small business, you’re probably running on a tight budget. Given that you are bootstrapping, you may not be able to pay for a full-time IT professional for your business’s IT support. However, to grow your business in the digital age, you need technical support. So what’s the best move to make?   Managed IT is the go-to solution for thousands of small businesses in the United States. These small-to-mid-sized enterprises need IT support but may not be able to afford an in-house IT department quite