Your password may be poor — update it now

For years, we’ve been told that strong passwords include three things: upper- and lowercase letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? Here’s why not and how it involves you.

3 Types of hackers you should know about

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who presents their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important.

Cloud migration made safe and secure

While many IT providers tout the revolutionary benefits of the cloud, very few address the security aspect of it. The fact is, when you’re using a cloud service, you’re moving information out of your hands and into a third party. So doesn’t it make sense to take precautions? Dropbox alone has had the accounts of […]

What exactly is proactive cybersecurity?

Most managed IT services providers (MSPs) promise “proactive” cybersecurity consulting. Businesses large and small embrace the idea of preventing cyberattacks and data breaches before they happen, and MSPs themselves would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events.

6 Tips to keep your Mac computer safe

Although it is important, security is something that some Mac users overlook. That’s fine if all you do is watch YouTube videos or experiment with Photo Booth, but not if you use your computer for day-to-day business operations. Prevent internal and external threats from harming your device with these tips.

4 types of hackers to watch out for

Why do hackers attack? Is it for money, notoriety, or political reasons? As a business owner, you should always try and find out the motive behind an attack to help you determine whether or not you’re a target and what data you need to protect. Let’s take a closer look at four different types of […]

Beware of these social engineering tactics

The Rio Summer Olympics took place years ago, but the hackers who infamously used social engineering to exploit the event are still with us. Although business owners may think that their systems are safe from malware, they may not be prepared for social engineering.

Making Email Encryption Easy with Provident Bracket

Have you ever needed to send a sensitive email – perhaps containing information you want only your management team to see? Or financial data which a client has entrusted to your accounting firm? Or an update regarding a client’s recent court case?

There are many everyday situations in which companies need to protect the information and data they are sending via online transactions.

5 Easy tips for preventing data breaches

Keeping your personal and professional information safe from cybercriminals is not easy. It takes constant vigilance and frequent training. There are dozens of simple tools and tips to help people with almost zero expertise stay safe online, but these five are our favorites.

The Real-World Truth Behind Disaster Recovery

Picture, for a moment, enjoying the breathtaking sites in Rome, Italy – an ocean away from your usual home life and work routine. The last thing you are likely thinking about as you toss coins into the Trevi Fountain is: will my small business be okay in the event of a disaster?

Yet that is exactly what Ric Hayman, President of Provident Technology, had on his mind when news broke on July 3rd that a major water main break had occurred in downtown Philadelphia.