fbpx

Cyber Security

social media cyber attacks

Is Your Social Media Use Making You Vulnerable to Cyber Attacks?

Social media is a major way that billions of people across the world connect with family and friends. It has also become a tool for cybercriminals, who can use information posted publicly online against you. In 2019, 27% of social media scams in the US took place on Facebook. If you’re not vigilant, you could become a victim of a cyber attack just from using social media.

Continue Reading

Microsoft Teams Basic Functions Under 10 min

In this video we go over basic functionalities of Microsoft teams such as making calls, meetings, screen sharing, taking notes, recording meeting and changing device settings. Learn more @ www.thecompulab.com how Microsoft Teams can change your business!

Continue Reading

Microsoft Teams Basic Intro Under 10 min

 

Why use Microsoft Teams? We go over some of the benefits of using MS Teams and a basic overview of how a small business could use it to streamline communication and collaboration.

Microsoft Teams is a great communication and collaboration platform that combines instant messaging, video meetings, file storage, screen sharing, basically one platform that integrates many of the different Office 365 platforms such as SharePoint, OneDrive, Planner, etc. We believe that is one of the biggest benefits of Microsoft Teams vs Zoom or GoToMeeting. Second benefit is that if you already have a Microsoft 365 subscription, you may be already paying for it, it’s just a matter of understating how it works, so you can start using it!

Continue Reading
mfa password protection

Multi-Factor Authentication: The Best Password Protection

In today’s technology-driven world, businesses need to continually improve digital security systems to protect their important data. It’s essential to have the right tools available for password protection to make sure your business doesn’t become a victim of cyber attacks. 

Multi-factor authentication is one of the best ways to provide more security for your business right now. Here are some of the key things you need to know about this security method.

Continue Reading

SharePoint Explained Under 10 min.

 

SharePoint Explained under 10 min. Follow up on our previous video about OneDrive. SharePoint and OneDrive have lots of similarities but are used for different purposes. SharePoint can get very confusing, in this video we go over SharePoint Document libraries and how they work, how to synchronize them with your Windows 10 computer and some of the benefits of using SharePoint vs other platforms like G-Drive or DropBox.

Small businesses can use SharePoint as a collaborative storage where multiple people can store, access, modify and collaborate in a central secure location. One of the biggest benefits we see when using SharePoint is that it integrates very well with other business applications like Word, Excel, Outlook, etc. It also has a nice integration with Microsoft Teams which we will explain in another video.

Continue Reading
Technician becoming stressed over servers in data center of IT provider

5 Ways COVID-19 Has Been an IT Wake-Up Call

COVID-19 has impacted nearly every aspect of daily life, and the business world is no exception.

Although some organizations were more prepared for the virus than others, all businesses had to make adjustments to adapt to new business conditions. The rapid changes made necessary by the pandemic were an IT wake-up call to many businesses as they realized what was lacking in their infrastructures and capabilities.

These are five areas that have been affected by the pandemic where business owners have recognized the need to update and improve their IT:

Continue Reading

To Zoom or not to Zoom?

With COVID-19, videoconferencing has become a daily routine for most businesses. Anyone who has had to work from home lately understands and appreciates the importance of  communication through videoconferencing with their clients or teams, some companies even take it a step further to host social gatherings. After this pandemic, video conferencing has become a way of life for most businesses. Zoom is easy to set up, easy to operate, and provides free access to up to 100 users at a time. But there are several downsides regarding its security. The ease of use of Zoom makes “bomb” an opening in Zoom conferences, easy for troublemakers. Information-security experts say that the protection of Zoom has had several security holes.

Continue Reading
Man logging in VPN on laptop

Cybersecurity Practices Your Remote Team Should Be Following

In the first weeks and months of the COVID-19 pandemic, the World Health Organization (WHO) reported a dramatic fivefold increase in the number of cyber attacks directed at its staff. It also warned the public to beware of the rampant cyber attacks and phishing scams that attempt to take advantage of pandemic panic.

Many other businesses and organizations are facing the barrage of these increased attacks, but because of the necessity of remote work, they are confronting these cyber threats with weakened out-of-office cybersecurity measures.

So, as many businesses look to make remote work a more permanent solution, one of the most important things they need to do is to protect their digital systems, assets, and communications.

Continue Reading

5 Ways SMBs Can Save Money on Security

5 Ways SMBs Can Save Money on Security

Small-to-medium sized businesses and large enterprises may seem worlds apart, but they face many of the same cyber-security threats. In fact, in recent years, cyber-criminals have increasingly targeted SMBs. This is because it’s widely known that SMBs have a smaller budget, and less in-house expertise, to devote to protection. Thankfully, there are several things SMBs can do today to get more from even the most limited security budget. And, no, we aren’t talking about cutting corners. Far too often, SMBs cut the wrong corners and it ends up costing them more money in the long run. It’s a matter of taking a smarter approach to security. Here are five smart approaches to take

  • Prioritize – Every business has specific areas or assets critical to its core operations. Seek the input of valued staff and team members to determine what these are. Is there certain data that would be catastrophic if it was lost or stolen? If hackers compromise a network, or prevent access to certain applications, how disruptive would it be to daily business operations? What kind of potential threats or vulnerabilities pose the greatest risk to the company or your customers/clients? Focus on the most likely risks, not theoretical risks that “could happen.” Asking such questions gives you a clearer more complete perspective as to where to focus available security resources.
Continue Reading

Four Key Components of a Robust Security Plan Every SMB Must Know

5 Things SMBs Can Do Right Now to Preserve Their Network and Systems

Four Key Components of a Robust Security Plan Every SMB Must Know

Most businesses are now technology dependent. This means security concerns aren’t just worrisome to large corporate enterprises anymore, but also the neighborhood sandwich shop, the main street tax advisor, and the local non-profit. Regardless of size or type, practically any organization has valuable digital assets and data that should not be breached under any circumstances.

This makes it the responsibility of every business, especially those collecting and storing customer/client information, to implement a multipronged approach to safeguard such information.

Yes, we’re looking at you, Mr. Pizza Shop Owner who has our names, addresses, phone numbers, and credit card information stored to make future ordering easier and hassle free.

Continue Reading