Malicious email: How to identify phishing scams, spam and malware

Malicious email: How to identify phishing scams, spam and malware

How much of your email is real business email? If you’re like most business professionals, you spend a lot of time keeping unwanted emails out of your inbox, while trying not to miss any messages from clients, colleagues and prospects. You may use various tools like: But no matter how many tools you have, educating your…

Disaster Recovery Planning – IT Lessons from Hurricane Season

Disaster Recovery Planning – IT Lessons from Hurricane Season

Hurricanes. Floods. Fires. Tornados. Natural disasters remind us that we can’t control everything. What we can control is how we prepare in advance and how we respond afterward. Disaster recovery planning is critical! Imagine that a fire burnt your business to the ground overnight. How quickly could you get back up and running? I worry…

Ghosts in the machine

Ghosts in the machine

IT Policies and Procedures Do you have a tight onboarding / offboarding checklist you use when hiring a new employee or consultant? If not, it’s likely you have “ghosts in the machine” – people who can still access your data, even though they no longer have an affiliation with your company.  Fortunately, most of the…