); Press "Enter" to skip to content

Posts published in “Social Engineering”

How to Craft a Strong Password and Keep your Data Safe!!

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Tuesday, April 3, 2018 There is a ton of information out there about how to create that perfect password.  As long as you follow the rules, your password should be strong and un-crackable.  Or at the very least, your password should be strong enough to outlast a few rounds of brute force attacks…

How to protect yourself from Phishing!

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Saturday, April 7, 2018 Phishing: Phishing is the act of sending out malicious emails and has caused over $1.2 billion in loss. These malicious emails can be highly targeted and involve an extensive amount of planning. A successful phishing campaign can create a depressing ripple effect. Phishing often targets small professional firms relying…

BYOD – Do you have a Written Policy?

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Wednesday, February 28, 2018 Bring your own device (BYOD) policies are becoming a more frequent topic of discussion when reviewing current IT & Documentation needs with our clients. Staff are bringing their devices to the workplace more and more frequently, and connecting (When possible) to your environments. Why not work with that…

3 ways hackers use your employees to their advantage

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Wednesday, February 22, 2018 Cyber criminals don’t just slip into your network with the help of some serious hacking skills. In fact, there’s a much simpler way to do that… through your employees. Social engineering is a tactic hackers are using more and more frequently to infiltrate systems. It involves a variety…