Tech Tips

May 08, 2024
Can you lower cybersecurity insurance premiums? Yes, by improving your company's current cybersecurity protections.
April 10, 2024
Public Wi-Fi networks are convenient. Unless you connect to a fake network...and fall victim to an Evil Twin cyberattack.
March 14, 2024
When did your team last refresh their cybersecurity awareness? Cyberattacks keep looking for new ways to sneak past you...
February 14, 2024
Phishing attacks can reach your users through Microsoft Teams...unless you change your permissions for external user accounts.
January 11, 2024
If you're not sure whether your domain has proper DMARC set up, here's a fast way to verify.
December 13, 2023
Even major cloud services can lose files. Unfortunately, this happened to some Google Drive users this November.
November 09, 2023
If you could do 5 quick checks of your website, and prevent a slew of technical issues throughout 2024, wouldn't you?
September 14, 2023
Do Macs have an encryption asset in their hardware? They do! It's called Secure Enclave.
August 10, 2023
A TPM chip makes encryption easier - protecting your data. Without one, it's easy for someone to steal your computer and access the data.
July 13, 2023
We expect phishing emails, and plan for them. But what if phishing attacks use a QR code instead?
May 10, 2023
Stopping phone attacks doesn't have to take expensive software. Use these free options to protect yours!
April 12, 2023
Get an instant security upgrade - just add MFA. Works for hundreds of applications, online and offline!
March 09, 2023
Changing email service providers? Make sure you remove the old provider's SPF/DKIM records, and put the new ones in their place.
January 11, 2023
USB drives use flash storage - safe, reliable. Unfortunately, they'll eventually die. If you use any of them, here's how to protect the data they store.
December 15, 2022
Scammers keep getting better at cheating people. Don't become a victim. Use these three 'giveaways' to identify scams.
November 09, 2022
Looking to save on IT-related expenses? Here’s a tip for businesses whose IT drains too much budget.
October 13, 2022
Looking to save on IT-related expenses? Here’s a tip for businesses looking for critical IT support work, without the high cost of hiring & retaining full-time talent.
September 15, 2022
Looking to save on IT-related expenses? Here’s a tip for businesses developing software, websites, or apps.
August 10, 2022
Looking to save on IT-related expenses? Here's tip #2 of 5 we have. These work for all businesses.
July 15, 2022
Looking to save on IT-related expenses? Here's tip #1 of 5 we have. These work for all businesses.
April 13, 2022
Training employees is one of the most powerful cybersecurity measures you can take. Yet many businesses won't do it. Why not?
November 10, 2021
Yet again, cybercriminals change tactics. They're using a new "Vishing" strategy to attack unsuspecting people. The strategy impersonates Microsoft, and even employs phone calls to trick you into giving them access.
August 12, 2021
Phishing attacks using PDF files – a common, easy-to-open document type – exploded in 2020. They use the same approach as phishing emails, but fewer people know about them. Here's how to identify an infected PDF...before you open it and unleash chaos.
July 15, 2021
First we had ransomware gangs. Then Ransomware-as-a-Service made ransomware into a cheap commodity on the Dark Web. Now cybercriminals have turned "VC" by investing in new make ransomware bigger and stronger!
May 13, 2021
Ransomware just got very real. Last week an attack took down a major U.S. oil pipeline, disrupting fuel supplies for millions. Consider this a big scary reminder – ransomware can & will target you, too.
March 10, 2021
Running your email through an Exchange Server? It needs a patch ASAP to fix a new vulnerability…a bad one.
February 11, 2021
Should you power off your computers at night, before you leave the office? Here’s the answer!
January 14, 2021
Business and personal online privacy are big topics these days…for good reason! This month’s Cyber Fu tip will focus on maintaining your business’ privacy while online.
November 12, 2020
We save passwords in our browsers all the time. It's easy…but is it secure? Would the browser protect your passwords if a hacker gained access? Maybe, maybe not. But a password vault will.
June 10, 2020
Your phone is as much a target for cyberattacks as your laptop. Practice good Cyber Fu when browsing on your phone, and put some protection on the device. One such protection is a free app called "NYC Secure."
May 13, 2020
When co-workers share passwords between them, you're asking for trouble. It could be a shared cloud service, an email account, even a shared computer. Each worker should always have their own account & unique password. Otherwise you open yourself up for cyberattack, and more.
March 11, 2020
The world faces a new viral threat. That doesn't stop scammers from trying to exploit it.
February 12, 2020
If you get a "Security Alert" from your bank, it may be a phishing email in disguise. To avoid the trap, don't click the link in the email – instead, use a simple workaround.
January 15, 2020
By now you know that Facebook tracks your activity, both on its apps and on other websites. Now they're using data to track your shopping habits in brick-and-mortar stores. A clear risk to privacy, especially if you use Facebook for business purposes. Here's how to stop it.
December 11, 2019
What do we have to look forward to on the cybersecurity front? Cybercriminals won't stop their attacks...but neither will the people combating them. Here are 8 predictions for 2020's cybersecurity outlook.
December 05, 2019
One-star negative reviews reviews affect your prospective audience's perceptions of your business. Potentially warding them off ever contacting you. No business is safe. Don’t despair though! You can do something about "leech" reviews.
November 13, 2019
You've secured the office network. Every device has protection. Every user has cybersecurity training. Here's one item you may have missed though – the office printer. Turns out cybercriminals can attack those, too.
October 09, 2019
Continuing our Green IT discussion, let's talk recycling. You can recycle virtually all IT hardware, from your phone to dusty old servers. It's better for the environment, AND helps you protect your data. Here's how.
September 10, 2019
We hope you never have to deal with ransomware. However, it pays to know what to do if it strikes. If that, "Your files have been encrypted" screen pops up, don't panic! You can disrupt the attack before it gets worse.
August 14, 2019
One of the most successful phishing scams involves a "boss" asking an employee to go out & buy gift cards. It uses clever social engineering, not advanced technology. Here's how you can spot & avoid the "gift card" scam.
July 10, 2019
It’s summer and most kids have a lot of time on their hands - and access to devices. Here are some steps you can take to make those devices less alluring, keep your kids safe from online predators, and protect your personal data ... all at the same time.
June 12, 2019
How many of your employees would click on a phishing email? If the answer's not an immediate "Zero/None," you have a cybersecurity vulnerability. Not sure who would & who wouldn't? Find out with a Phishing Test.
May 08, 2019
Windows 7 will reach “End of Life” in January 2020, and as a result, will become vulnerable to cyberattacks. That means it’s time to upgrade!
April 10, 2019
Cybercriminals hammer on Microsoft 365 accounts every day. They want to break in, steal data, and wreak havoc. However, a new M365 phishing scam goes further: It uses your email account like a puppet.
March 06, 2019
Some websites contain malware, ready to infect your network. Other websites allow employees to fritter away hours of productive time. You can block them all with a Content Filter.
February 07, 2019
Almost every cloud service needs a secure password. How do you remember them all? Unless you have an incredible memory, you probably don't. Companies who keep all their services in the cloud are moving to SSO in droves.
January 09, 2019
You're on a business trip and you lose your phone. Or someone steals your laptop. What do you do? You call your IT department and ask for a Remote Wipe. Before someone exploits all the company data on your device.
December 12, 2018
Cybercriminals love to target business travelers. Stealing their devices or dropping malware onto them via unsecured Wi-Fi. However, if your employees follow these 7 laptop safely requirements, their devices and data will stay safe.
November 07, 2018
How often should you apply security patches/Windows updates? Stick to a monthly schedule a week or two past Update Tuesday. Why? Well, not every patch arrives in perfect working order.
October 10, 2018
Does your workstation contain any pirated software? If so, remove it ASAP. Beside the fact that it’s illegal, there are two more reasons not to pirate software…both of which involve your company's cybersecurity.
September 12, 2018
In today's Cyber Fu tip, we explain what an "Asset Tag" is. Tagging your IT hardware serves one vital purpose: Preserving information about each device, in case something bad happens to it.
August 07, 2018
For today's Cyber Fu tip, let's talk about email. Using personal email for work purposes is frowned on…but why? We'll give you not one, but three reasons.
July 12, 2018
For today's Cyber Fu tip, we're learning about personal email use at work. The reasons never to use a personal email address at work, for any work function, keep piling up.
June 07, 2018
In this Cyber Fu Tip, we look at strong/weak passwords. Password strength can make you - or break you - when it comes to cyber-warfare. Strong passwords generally take two forms. Weak passwords, well, there are all kinds of those. These examples should clarify how to make your next password super strong.
May 10, 2018
For today's Cyber Fu Tip, we're talking DDoS attacks. What they are, how they can impact your business, and what you can do to prevent them.
April 05, 2018
Starting this month, we're bringing you a new cybersecurity tip each month! First, a warning about a type of phishing attack…that spreads through voicemail.
March 08, 2018
Many workers power down their workstations at the end of the day, thinking they are saving power and protecting their machines from hackers. But should they?
February 08, 2018
With cyber threats multiplying daily, every company workstation needs a business-grade anti-virus. But which solution is right for you? A locally-installed antivirus or a cloud-based security suite? Let's weigh the pros and cons.
January 11, 2018
Social Media has opened a new world of communication to all, but it has a dark side. According to a former Facebook executive, “you are being programmed.” Now that 2018 is here, consider curbing your Facebook habit. Your brain needs the freedom to think!
December 07, 2017
If you’ve heard that thieves have a device that can detect laptops in car trunks, they don’t. But you should still exercise some caution traveling with your laptop. Here’s the truth about “laptop detectors” and laptop safety measures.
November 14, 2017
Phone calls, chat, conferencing, social...what's your favorite communication method? We have plenty of choices now, but businesses tend to gravitate toward one or two.
November 09, 2017
Nearly all Wi-Fi networks have a vulnerability in them. It’s called KRACK. The good news? It’s not too easy to exploit. We also have patches for most systems. Here’s what you should know.
October 05, 2017
Don’t throw old IT hardware in the dumpster. It’s bad for the environment, and you could lose valuable Intellectual Property to thieves. Instead, use these secure disposal methods.
September 07, 2017
Your business files need to stay private online. Using a secure cloud storage option is the best way to keep them away from cybercriminals.
August 03, 2017
Without DNS, no one could get anywhere on the Web. That means it’s a way to track where you go, unless you use a secure set of DNS numbers. Part 4 of 4.
July 06, 2017
VPNs surround your Internet connection, like armor keeping your data hidden from prying eyes. If you use the right VPN, that is. Part 3 of 4.
June 14, 2017
MacRansom is the latest ransomware targeting Macs. While MacRansom itself isn't a big threat, the fact that ransomware-as-a-service now targets Mac users is.
June 07, 2017
If a cybercriminal can’t access your computer’s hard disk, they can’t steal data off it. Disk Encryption helps stop them. Part 2 of 4.
May 22, 2017
We sent this notice to all of our customers, 1 week after the WannaCry ransomware spread worldwide. Even if you weren't hit, take the steps to protect your company's data...or you could be next.
May 11, 2017
Private browsing. It's just one way to keep your online activity private and away from prying eyes.
April 06, 2017
Having problems with Outlook? The culprit could be an Add-In. Learn how to locate a conflicting Add-In and how to fix the problem.
March 09, 2017
Consistent email signatures make your organization look professional. CodeTwo keeps you and your team looking professional at all times.
February 09, 2017
Google is serious about HTTPS, and you should be too. Websites without HTTPS will receive a 'flagged as unsafe' warning. Don't let your website lose ranking over this.
January 10, 2017
Think twice before accessing the Wi-Fi network on your next flight. If your computer isn't protected, a hacker on board could steal data right off of it.
December 06, 2016
Is your password guess-proof? Could someone guess it in 100 tries? If there's even a small possibility someone could, consider these tips for making and keeping strong passwords.
November 02, 2016
What happens when the platform you store your photos on decides to call it quits? Users of Seagate Lyve are asking themselves that very question.
October 07, 2016
Finding a USB flash drive or SD card when out in public might seem like a bit of good luck. Watch could have malware on it. Don't risk your information getting stolen. Don't plug it in!
July 05, 2016
Not sure if an email is legitimate, or if it contains malware? Here's a quick way to find out within Outlook. Just be careful not to send it to anyone else!
April 29, 2016
Apple has stopped updating its QuickTime video player. Trend Micro discovered 2 bugs in QuickTime, leaving anyone who still has it installed vulnerable to attack. Solution? Uninstall it!
March 28, 2016
For years now, Mac users didn't have to worry about ransomware stealing their data. Now they do. Ransomware has arrived on the Mac.
February 23, 2016
Does your email bounce back for no reason? If you use personal email for business purposes, your email address might have ended up on a blacklist. Here's how it happens, and how you can check.
January 25, 2016
A Marketing Automation system helps businesses save time on their marketing, and still keep up. We gathered 6 marketing automation systems for small, mid-market and enterprise businesses use in this Tech Tip.
December 17, 2015
Take a moment before the New Year's Eve party to check your backups. Making sure they're stable and up-to-date now, means your data is safe and secure going into 2016.
November 24, 2015
Phone & laptop batteries do have a lifespan...but there are ways to extend it. Both through extenders and good battery management. Here's some advice to help keep your batteries running.
September 25, 2015
Servers need a certain set of environmental conditions to run well. Heat, cold, dust, and moisture can all disrupt or even damage them. Here's a list of environmental risks to a server, and what you should do instead.
September 16, 2015
Fund a negative review on Google Business Profile for your business? Naturally, if it's spam or fraudulent, you'll want it removed. Google does have a process for reviewing and removing it.
June 04, 2015
Ever searched for a domain name to buy, then come back later & someone else claimed it? There's a name for this practice - Domain Name Front Running. Here's why it happens, and how to avoid losing domains to it.
May 06, 2015
Mobile Internet access exceeded PCs in 2014. Google added "mobile-friendliness" to its ranking factors in April 2015. Now sites that display well on phones & tablets rank better in mobile search than the sites that don't. How does yours look?
April 07, 2015
As if malware wasn't bad enough, ransomware has invaded the Web. It doesn't just infect holds them hostage! Here's what to know about ransomware, and ways to protect yourself.
December 02, 2014
Can you copyright website content? Should you? We asked Terry Church at Silicon Valley Law Group for the ins and outs of content copyright.
October 01, 2014
Have you seen the news about "Shellshock" yet? A bug in Linux and Mac OS X software which the media's calling "worse than Heartbleed." We think it's an issue, but not that bad. Here's why.
July 27, 2014
What identifies an email as spam? Mail servers will scan for certain words, phrases or email elements to catch spam. Sometimes they grab a legitimate message because it has a few of those characteristics. Here's how to avoid getting caught.
June 29, 2014
Most cloud services are reasonably safe. Still, there are files you should never store out there in the cloud. Here's what types of files you should keep safely local.
May 28, 2014
When is your ISP's contract up for renewal? If you let it pass without review, you could get stuck in an auto-renewal and miss out on better rates. This Tech Tip explains how to avoid that.
November 01, 2013
Why do we still have a max size limit on email attachments? 10MB, 25MB, even 50MB attachment sizes aren't enough! However, good reasons for size limits do exist. As do better options for sharing large files.
October 26, 2013
Do your network cables look like spaghetti cascading down from the racks? If there's an issue, disorganized and unlabeled cabling can cause even more trouble. This month's Tech Tip gives tips on how to organize & manage network cables.
August 27, 2013
Last month we showed that major tech firms can and do share your information with government. What about third parties, like other companies? Privacy policies tell the story. It's better than the government data sharing...but not completely.
July 08, 2013
We've all clicked Yes on a Privacy Policy without reading it. But you should really know what's in that policy...especially when it allows a provider to share your data with the government. Here's what 5 such providers say about government data sharing.
May 29, 2013
If cyber-thieves are breaking into your network, how would you know? That's what Intrusion Detection Systems are for. These devices monitor network activity for anything out of the ordinary, and alert you if they sense something wrong. This Tech Tip covers our Intrusion Detection recommended product, and how it does the job.
April 10, 2013
Conducting an IT Security Audit helps you determine if there are security issues in your network. But what do you get from the audit itself? How do you use its findings to improve network security? A good audit will give you an action plan...and here's what it includes.
February 05, 2013
Does your office use a consumer-grade wireless router (like D-Link or Netgear) in the office? You may have trouble with your connections. Read our Tech Tip for the reason why.
March 02, 2012
When you need to hire IT workers, what's a good average to figure on between IT employees to all employees? Is there an 'ideal ratio' for certain business sizes? Debate varies widely on an ideal number of IT workers, but there are some good "Rules of Paw" to follow.
August 24, 2010
I've been receiving emails sent to We don't even have an account for that address. These emails look legitimate... Phishing alert!
May 29, 2010
"Do we really have to put an 'Unsubscribe' address in our email marketing?" This is called an opt-out address. You should definitely include it. Otherwise you'll look like a spammer. And it is required by law.