by Roger Billings | Nov 14, 2018 | blog
When it comes to cyber security, phishing emails are perhaps the single most out of control and effective method of attack we face today. All the attacker needs to do is convince the recipient to make a couple clicks and they are in. A staggering 72% of cyber security...
by Roger Billings | Aug 8, 2018 | blog
Setting up a firewall is a simple process that greatly increases your computer’s security posture. It may sound like an overkill, but even if your computer just sits in your living room at home, it still needs a firewall enabled. Firewalls are the police force...
by Roger Billings | Jul 23, 2018 | blog
A lot has been said about this already, but using strong passwords that are unique for each online service is still one of the best things you can do to prevent problems. If Adobe were hacked, for example, and the password you used to sign up for Adobe product...
by Roger Billings | Feb 1, 2017 | blog
Many consumers believe that they are unimportant enough that no hacker would even care about them. Unfortunately, that simply isn’t true. The good news is that you have a distinct advantage over hackers. Read More ...
by GoldKey | Sep 29, 2015 | blog
We are having good success with the deployment of GoldKey Secure Web. The need for a very secure way to protect access to key websites is expanding daily. As more and more important functions and transactions are accomplished online, the number of websites being...
by GoldKey | Aug 8, 2015 | blog
Many organizations such as schools, banks, and the enterprise have a large deployment of computer systems managed by a central support team. Often individual laptop computers issued to various employees are also maintained by a central support organization. These...