Stumped by what to give your favorite techie this year? Here are a few inspired ideas along with some expert lists for you to consider. There’s still plenty of time to find the perfect gift!
03 Dec 2015
Phishing emails sent to business users are nothing new. Phishing emails appear to come from legitimate businesses asking the recipient to enter some type of information or click on a link. Although they look real, they’re really gathering personal or business data for nefarious purposes.
Do you know what to look for to determine if an email is “suspicious”? Hackers have become very clever by creating emails that look legitimate, especially at a quick glance. Unfortunately, you could make one wrong click in an email and expose your entire network to a serious breach.
Creating strong, unique passwords is one of the best defenses we have against cyber criminals. However, it can be a challenge to come up with a new password every time we sign in to a new account. At CRU Solutions, some of us have over 50 password-protected accounts. Do you know how many passwords you use?