Security

Why I Switched to Proton Mail: A Privacy-First Approach to Email

I honestly hate how much companies can know about you just by gleaning bits and pieces from your data. It’s not that I have anything to hide – I don’t. But I fundamentally disagree with companies having access to my personal information without my explicit consent.

Why I Switched to Proton Mail: A Privacy-First Approach to Email Read More »

Embracing Cybersecurity: The Power of ‘Least Privilege’ in Employee Training

I would consider using the principle of least privilege as one of the most important steps admins can take to protect their networks. My team and I consider the networks we work on as ‘our network.’ We put hard work into keeping the systems running and secure, but an often overlooked area is controlling system

Embracing Cybersecurity: The Power of ‘Least Privilege’ in Employee Training Read More »

Why a Security Audit is Vital for Today’s Small Businesses

One of the often overlooked security vulnerabilities for today’s small businesses is a lack of a plan to protect the business’s electronic data. Many owners who would never dream of leaving their office unlocked after hours will leave their electronic data unprotected, often costing their company thousands of dollars in damages when that data is

Why a Security Audit is Vital for Today’s Small Businesses Read More »

Scroll to Top