Blog

Keep your home network safe in 10 simple steps

Practical tips to better secure your home network.

Change the default name of your home Wi-Fi
The first step towards a safer home Wi-Fi is to change the SSID (service set identifier). SSID is the network’s name. Many manufactures give all their wireless routers a default SSID. In most cases it is the company’s name.

Cybersecurity tips for working remotely

Remote work policies have become a necessity not just because of the current coronavirus crisis, but also for the ways they improve a company’s bottom line and efficiency. Yet despite remote work’s benefits, it leaves you and your company exposed to online scams and other cybersecurity threats. To defend your company and your remote workers, make sure to heed the following tips.

Single sign-on: The key to user management

From complexity requirements to minimum lengths, creating a password for a new online account can be bothersome. If your RIA is struggling with your password policy, single sign-on (SSO) can help. This technology is secure, easy to manage, and eliminates the need to remember a long list of usernames and passwords.

Hackers come in all shapes and sizes

Hackers are known by the general public as cybercriminals, especially with news about millions of customers information being stolen and government agencies paying ransoms hackers. However, did you know that not all hackers are bad guys? Read on to learn more about them.

How to speed up Google Chrome

Google made its foray into web browsers in 2008 with Chrome. With its remarkable speed and ease, Chrome was welcomed by many users. However, over time, the browser becomes a bit sluggish, especially if you’ve installed extras such as extensions. Follow these easy steps to ramp up your Chrome browser’s speed.

Office 365 hacking: What you need to know

With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected.

A phishing scam that harvests users’ credentials

The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials.

Cybersecurity: How to defend your RIA from insider threats

In the cybersecurity world, an insider threat is an individual or business partner who uses company data inappropriately. Today's RIAs must take proactive steps to prevent insider threats, which is why we put together some tips and tricks.

#1 Educate

Teach your team to recognize personally identifiable information (PII) and understand the financial implications of a breach.

7 essential Office 365 add-ons for your RIA

Microsoft Office 365 productivity applications like Word, PowerPoint, Excel, OneNote, and Outlook have allowed RIAs to meet client demands efficiently, and its numerous productivity add-ons have enabled users to deliver more in less time. Here’s a handful of Office 365 extensions that help you improve workflow.

Business continuity in the cloud

Backing up to an internal drive or an external hard drive won’t completely secure data. If someone steals your device, you instantly lose the backup it contains. Natural disasters, cybercrime, or man-made errors will also likely destroy your backups. As a result, your company could face expensive downtime.