by Tom Herdt | Jan 14, 2026 | Uncategorized
Passwords: boring but they matter Passwords are something that you and every employee can use to protect your data and maintaining this important protective wall against criminals is relatively easy. Take the time to follow basic good practices, most of which are...
by Tom Herdt | Jan 7, 2026 | Uncategorized
Four easy ways to thwart cyber criminals With all the talk about cybercrime and the recent spate of headlines about ransomware, concerns for your data security and the safety of your business keep growing. Avoiding a data breach is critical to your business, so it is...
by Tom Herdt | Dec 31, 2025 | Uncategorized
Password Hygiene Best Practices According to a report by Verizon, 80% of data breaches are caused by weak or stolen passwords. In addition, the report found that 60% of users reuse the same password across multiple accounts, making it easier for hackers to access...
by Tom Herdt | Dec 24, 2025 | Uncategorized
Password Management Tools: An overview Effective password management is an essential aspect of cybersecurity. With the increasing number of online accounts and services, remembering all those passwords can be a daunting task. Password management tools provide an...
by Tom Herdt | Nov 12, 2025 | Uncategorized
IT isn’t just about filling seats No matter the size of your business, no matter what the product or service, your company is at least partially reliant on technology to survive and function in today’s marketplace. It is just unavoidable. A significant portion of...
by Tom Herdt | Nov 5, 2025 | Uncategorized
Risk assessment: A Value model Risk assessment means looking at all the conditions, situations and threats that exist that could damage or bring down your business. Risk assessment is all about identifying the external and internal threats that exist and measuring the...