How quickly can your password be hacked? It depends. Hackers use sophisticated knowledge and tools to try and crack passwords. You can make it harder for them by using multi-factor authentication, complex passphrases, or passwords created at random by a password manager.
Read More
Explore Thought Leadership, Expert Insight, News, and More on Our Cybersecurity Blog
CRU Solutions’ cybersecurity blog features information about small business IT for decision-makers and end-users. Check back often for new information or subscribe to receive regular updates!
Exactly What You Should Know About Vishing
Have you heard of vishing? Think of it this way: voice + phishing = vishing. Here's exactly what you should know about vishing.
Read More
What to Know About Cyber Insurance for Your Small Business
A few years ago, most small business owners considered cyber insurance optional. Today, cybercrime is so far-reaching that no organization is too small for cyber insurance. Here’s what to know about cyber insurance for your small business.
Read More
How Dark Web Monitoring Makes Stolen Credentials Less Valuable
Buying and selling usernames and passwords on the Dark Web is big business. If you know your data is out there, you can make it less valuable. Dark Web monitoring can help you stay one step ahead of the bad guys.
Read More
How to Safely Transfer 2FA Authenticators to Your New Phone
You have a new phone! Remember to take these few extra steps to safely transfer your 2FA authenticators (not as much fun as your photos and videos, but necessary).
Read More
How PayPal Money Request Scams Affect Small Businesses
PayPal money request scams are affecting small businesses in Northeast Ohio. An eagle-eyed client of ours recently avoided losing several hundred dollars by recognizing a fake money request.
Read More
CRU Solutions Celebrates 40 Years
Act with integrity and do the right thing. Be helpful and truthful. - Jim Kerr
These words motivate every team member at CRU Solutions. They guide how we interact with each other and with our clients. Jim Kerr has cultivated this approach since he began the business 40 years ago.
Read More
How to Dispose of Old Computer Equipment
You’re moving to the cloud so your servers are obsolete and your IT support team is installing new desktops. How do you dispose of your old computer equipment?
Read More
How Cybercriminals Get Your Email Address
A client recently called us out of frustration with a phishing email. He demanded to know why we couldn’t stop cybercriminals from emailing him. He’s tired of worrying about clicking on links and attachments. He wanted to know how he could keep his email address out of the wrong hands. Here's how cybercriminals get your email address.
Read More