by computer service | Nov 18, 2024 | Aditi Zero Trust, Data Breach, Hackers, IT Solutions, Security Learning
Remember Physical Data Security Just like fortified castle defenses, most electronic data security focuses on the internet. Phishing emails, malicious websites, unsavory social media links, public Wifi connections, and weak passwords. All are potentially exploited...
by computer service | Oct 23, 2024 | Data Breach, Hackers
Big Company, Big Breaches, Big Settlement If you’ve ever stayed at hotel, you’ve probably stayed with Marriott. Marriott International is the world’s largest hotel company. Nearly 8900 properties in 141 countries and territories. Wow!...
by computer service | Oct 10, 2024 | Hackers, Security Learning
What to do when your software needs Windows Admin rights: safely using QuickBooks & Lacerte Overview Lacerte and QuickBooks require Administrative Windows user level permission to keep software updated. This is different than the various QuickBooks user level...
by computer service | Apr 10, 2024 | Hackers, Malware, Security Alert, Security Learning
Weakness Scoring System Our Federal government division witin the Department of Commerce, under the National Institute of Standards and Technology, NIST, has a National Vulnerability Databaase designed to help the public, and especially the technical administrators of...
by Cyber Guru | Oct 11, 2022 | Compliance, Data Breach, Hackers, HIPAA, Podcast, Security Learning
Listen in as we kick off Cybersecurity Month with another great interview by Dorothy Cociu on the Benefits Executive Roundtable. In this show we discuss hot security topics and security breaches in 2022 and 2021. Find out what’s been happening and what you can...
by Security Expert | May 20, 2022 | Data Breach, Hackers, IT Solutions, Security Learning, Uncategorized
Aditi co-founders Ted Mayeshiba and Ted Flittner are interviewed in this lengthy article written by Dorothy Cociu, President of Advanced Benefit Consulting. We invite you to learn more about current computer and phone electronic data security threats and how to...