Will Log4J Break the Internet? Experts Say Maybe.

Will Log4J Break the Internet?

One of the digital world’s most dangerous security breaches is currently unfolding, sending everyone from governmental agencies to cybersecurity experts scrambling to patch the hole. It comes at the hands of a critical software vulnerability discovered in Log4J, a Java-based software library used in nearly a third of all web servers in the world. Also […]

What Are File Permissions?

https://youtu.be/9d75lm62BXM Today I want to talk to you about file permissions and the need to review those on a periodic basis. These are ultimately just files that you create on your computer. Many times, the files are on what we call a network share. The files are under the Q drive or the Z drive. […]

What Is A Baseline Security Assessment?

I want to talk to you this morning about a baseline network analysis, or possibly what could be called a security risk assessment. And why you need one. Philip Long here, CEO of Business Information Solutions in Cyber Fortress. First off, let’s talk about what is a baseline security risk assessment? Well, ultimately, it is […]

Beware Of Scams This Holiday Season

Welcome to another tech tip Tuesday today, we’re going to talk about the scams that we’re currently seeing out in the marketplace. What type of holiday scams are we seeing out in the marketplace? I want to talk about four of them that we’re seeing that are pretty prevalent. And the first one is mimicking […]

4 Things You Shouldn’t Leave Out of Your 2022 IT Budget

IT Budget Blog

Covid-19 has challenged every aspect of running a business, and budgeting is no exception. As businesses prepare for the upcoming year, many will be forced to prioritize where to spend their hard-earned dollars – and where to scale back.  You should never cut costs when it comes to IT, especially in 2022. Cyberattacks are more common […]

What is the Technology Triad?

Business Technology Application

Let’s go over what we call the TechnologyTriad. And with this, it is a representation of how technology touches the people and also the security aspect of your business. There are three separate yet correlating components. When we look at the people component, we have to understand that satisfaction of people as it relates to […]

4 Technology Tips for Good Mental Health

Technology is a powerful tool. Like most things of power, it’s consequences can be good or bad depending on how you use it. This is especially true in terms of mental health. Emerging technologies have led to great advances in patient care, making it easier than ever to connect patients with mental health providers online. […]

Microsoft 365 and Working on The Go

With an incredible 42 percent of the U.S. workforce working from home thanks to Covid-19, the need for digital solutions to boost productivity while out of the office is on the rise. Always an industry leader in its field, Microsoft has risen to the challenge with a lineup of great productivity tools in Microsoft 365 […]

How Security Awareness Training Can Greatly Reduce Security Breaches [VIDEO]

Did you know that 95% of breaches involve employee error? Your employees are both your greatest asset and biggest downfall. And right now, hackers are becoming more sophisticated and finding new ways to infiltrate your network through unsuspecting employees. Some of their latest schemes include fake emails and hacked websites. Your staff needs to be […]

One Surefire Way to Bounce Back from Ransomware [VIDEO]

Whether it’s ransomware or a flood, unexpected catastrophes happen. Instead of being reactive to an accident, prepare yourself and business for when it happens. The only way to ensure that your business can be back up and running fast is with a carefully constructed backup and disaster recovery plan. In this video, Phillip Long breaks […]