by Performance Connectivity | Oct 17, 2018 | Compliance, Cyber Security
Have you ever noticed that your email client application has both spam and junk mail folders? What exactly is the difference and when should you use each? The difference largely comes down to permissions. Spam is unsolicited email, aka, mail that you haven’t asked for...
by Performance Connectivity | Jun 27, 2018 | Cyber Security, Proactive Monitoring
You’re working at your computer when all of a sudden – BAM! – you get a pop-up that claims your PC is infected with a virus. It advises you to “click here” to run a scan or install antivirus software. DON’T DO IT! This is a common tactic used by hackers to get...
by Performance Connectivity | Jun 20, 2018 | Cyber Security
A weak password is still one of the most common ways hackers break in. Thanks to sophisticated brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess...
by Performance Connectivity | Jun 13, 2018 | Cyber Security, Proactive Monitoring, Remote Access Solutions
If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop to log into cloud applications – DON’T! Unless your personal device is covered under our managed services plan, you could accidentally...
by Performance Connectivity | Jun 6, 2018 | Cyber Security, Proactive Monitoring
Did you know your company’s bank account doesn’t enjoy the same protections as a personal bank account when it comes to fraud? If a hacker takes money from your business account, the bank is NOT responsible for replacing your funds. (Don’t believe me? Go ask your bank...