Security Tag - Page 3 of 17 - Kutztown, Pennsylvania | Lantek

    blog-img

    It’s all well and good to practice caution when clicking on links in your emails, but chances are you’ll eventually have to commit to clicking on one of them, whether you like it or not. In cases like this, it’s best to go against these links armed with as much information as possible about what they are. Let’s go over how you can check their legitimacy quickly and effectively.

    Read More
    blog-img

    We know that security is far from a small investment, but this only serves to highlight how important it can be to your business’ continued success. You might wonder why security is such an important investment if you don’t intend to suffer a data breach, and that’s precisely the point. The cost of not investing in security far outweighs the initial investment.

    Read More
    blog-img

    What if Edgar Allan Poe wrote “The Raven” during the information age?

    Read More
    blog-img

    It doesn’t always take a complicated malware or ransomware attack to break your business. Sometimes it’s as easy as someone sending you an email and pretending they have authority over you. Compromising a business email is one of the most common and easy hacking attacks to pull off, so you should be aware of how to put a stop to it.

    Read More
    blog-img

    Microsoft generally takes security very seriously, and for the most part, if you keep your Windows and Server operating systems updated, you can generally depend on some base-level security and stability. Unfortunately, it was recently discovered that, for almost two years, a very critical defense mechanism within Windows wasn’t being properly secured.

    Read More
    blog-img

    In August, LastPass suffered a data breach that allowed hackers to access the LastPass source code. Let’s take a look at this situation and see what you need to do to maintain proper password security moving forward.

    Read More
    blog-img

    Just like any other business that takes some time to get to know a new client, a new type of ransomware can take up to two weeks to map a network before it goes in for the kill. This threat from a group called Zeppelin has the potential to be a major threat actor in the ransomware space.

    Read More
    blog-img

    Cybersecurity, to many, can sound inherently complicated—complicated enough, perhaps, that many may elect to put it off for as long as they can, or even choose to go without it. Even without our obvious bias factoring into our considerations, this is a bad idea. Let’s go over some basic security practices that are simple to enact, but can easily make a world of difference for your security.

    Read More
    blog-img

    We’d be the first to admit that, as much as we’d recommend that you use multi-factor authentication wherever it is available, MFA isn’t perfect. This makes the idea that an improvement to these methods is on the horizon an intriguing one. Let’s discuss what may become the new and improved standard fairly soon.

    Read More
    blog-img

    Did you know that you could be the victim of a data breach without even knowing it? It’s possible, really. If a hacker has managed to infiltrate a website or service that you use without giving up the goat, so to speak, they could have your information and you might not even know about it. Thankfully, there are ways around this, and it all starts by asking that simple question: what if my information was stolen, and what is it being used for?

    Read More