Blog

Explore Thought Leadership, Expert Insight, News, and More on Our Cybersecurity Blog

CRU Solutions’ cybersecurity blog features information about small business IT for decision-makers and end-users. Check back often for new information or subscribe to receive regular updates!

Business Risks from the Internet of Things

Can Your Coffee Maker Hack Your Server?

Can your smart coffee maker hack into your server?  Consider this:  your smart coffee maker at home (or at the office) is likely connected to the same network you use for your computer.  If a bad guy can get to your coffee maker, he can get to your network.  Be aware of the business risks from the Internet of Things (IoT). 
Read More
How your browser affects your online privacy

How Your Browser Affects Your Online Privacy

What’s your favorite browser?  How you use a browser affects your online privacy.  Let's look at the information browsers and websites gather and how you can better protect your privacy online.
Read More
AI Can Help Improve Small Business Cybersecurity

How AI Can Help Improve Small Business Cybersecurity

More small businesses are using AI than ever before.  As with all new technologies, we’ll learn about the risks and benefits as we go.  The exciting news is that AI tools can help improve your small business cybersecurity.
Read More
choose the right IT services company

How to Choose the Right IT Services Company

It's time to make a change and you want to choose the right IT services company.  It’s a big decision.  You’re entrusting a firm with access to your network along with the responsibility for securing it.  Here’s how you can make the right choice.
Read More
zero trust cybersecurity

Why You Should Implement Zero Trust Cybersecurity

Zero trust cybersecurity is a model that assumes no person, application, or device is automatically trusted.  It’s a twist on more traditional security models, which typically rely on perimeter security tools to protect networks.  The result is better protection against cyberattacks.
Read More
multi-factor authentication (MFA)

Why You Should Use Multi-Factor Authentication (MFA)

Using multi-factor authentication (MFA) is one of the best ways to help keep your online accounts secure.  While MFA can be defeated (since no tool is 100% perfect), the extra step creates a roadblock that may make a cybercriminal more likely to move on to the next target.
Read More
Identify and Prioritize Technology Gaps

How to Identify and Prioritize Technology Gaps

As systems age and technology advances, weaknesses and gaps become more apparent.  Your IT provider can help you identify and prioritize the technology gaps in your business to fit your needs and budget.
Read More
Password Be Hacked

How Quickly Can Your Password Be Hacked?

How quickly can your password be hacked? It depends. Hackers use sophisticated knowledge and tools to try and crack passwords. You can make it harder for them by using multi-factor authentication, complex passphrases, or passwords created at random by a password manager.
Read More