by Performance Connectivity | Feb 1, 2019 | Best Practices, Cyber Security
The security of your accounts is important for several reasons. Personal, sensitive information may be associated to your account such as your emails, contacts, and photos. In addition, other services may rely on your email address to verify your identity. If someone...
by Performance Connectivity | Jan 22, 2019 | Best Practices, Compliance, Cyber Security
Small and mid-sized businesses are being increasingly targeted by hackers. Their data is being exploited, held ransom, sold and corrupted. This kind of disaster can crush the public faith in your business, result in expensive fines, and even shutter your business for...
by Performance Connectivity | Dec 12, 2018 | Backup Disaster Recovery BDR Services, Best Practices, Disaster Recovery Solutions, Hardware
Many business owners know they need a dedicated server for their business, but few understand what a server is, how it works or why it’s important. Over the next few weeks, we’ll be answering all these questions to help you fully understand the role a...
by Performance Connectivity | Oct 17, 2018 | Compliance, Cyber Security
Have you ever noticed that your email client application has both spam and junk mail folders? What exactly is the difference and when should you use each? The difference largely comes down to permissions. Spam is unsolicited email, aka, mail that you haven’t asked for...
by Performance Connectivity | Jun 20, 2018 | Cyber Security
A weak password is still one of the most common ways hackers break in. Thanks to sophisticated brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess...