Logo 2 opaque
  • Home
  • Service
  • News
  • About us
  • SOS!
  • Customer Portal
    • Portal
    • Remote Access
  • (570) 779-4018
  • Home
  • Service
  • News
  • About us
  • SOS!
  • Customer Portal
    • Portal
    • Remote Access
  • (570) 779-4018
Contact us
Protect Your Business with Passwordless Authentication

Protect Your Business with Passwordless Authentication

Posted by By Amanda Herstek July 16, 2023Posted inArticles, Cybersecurity
"123456," "letmein," and "password" remain all too common passwords. It’s difficult to believe, but people still use simple, obvious passwords. They even repeat them across sites to avoid having to…
Read More
How Your Business Could Benefit from a vCIO

How Your Business Could Benefit from a vCIO

Posted by By Amanda Herstek July 5, 2023Posted inArticles, Cybersecurity, Guides
Businesses often hire a managed service provider (MSP) for tech support. But if that’s all you’re getting from your MSP, you could be missing out. You might gain by adding…
Read More
What VPNs Can and Can’t Do

What VPNs Can and Can’t Do

Posted by By Amanda Herstek June 27, 2023Posted inArticles, Cybersecurity
Virtual private networks (VPNs) are becoming more common. Many people use VPNs to establish an encrypted connection over a public network or to add privacy and security. Think of a…
Read More
Password Autofill: Convenience Compromising Security?

Password Autofill: Convenience Compromising Security?

Posted by By Amanda Herstek June 8, 2023Posted inArticles, Cybersecurity
“What’s that password again? Wait, I changed it … Harrumph. I don’t remember!” We’ve all been there, sometimes many times a day. Password autofill on our Web browsers felt like the sun…
Read More
What is Zero-Click Malware?

What is Zero-Click Malware?

Posted by By Amanda Herstek May 30, 2023Posted inArticles, Cybersecurity
You know not to open an email attachment from someone you don’t know. You also avoid downloading unexpected files or questionable popups when you go online. But did you know…
Read More
Businesses Beware OF Fake Meeting Requests

Businesses Beware OF Fake Meeting Requests

Posted by By Amanda Herstek March 29, 2023Posted inArticles, Cybersecurity
Hi, Important that we meet discuss speerfishing attacks over business comunicatons. We need to make plan about this IMMEDIATELY. Please click on the link [uurl.callender.com] to make an appointment with…
Read More
Common Cybersecurity Myths Debunked

Common Cybersecurity Myths Debunked

Posted by By Amanda Herstek March 29, 2023Posted inArticles, Cybersecurity
In many areas of our lives there are myths that we accept as fact. Some of these are actually quite dangerous: believing that lightning never strikes in the same place…
Read More
Tackle These Four False Assumptions about Cyber Attackers

Tackle These Four False Assumptions about Cyber Attackers

Posted by By Amanda Herstek March 29, 2023Posted inArticles, Cybersecurity
There’s one big assumption about cyber attackers that we regularly refute: “It can’t happen to me.” At this point, most businesses do recognize the serious nature of the cyberattack threat.…
Read More

Posts pagination

Previous page 1 2 3

Recent Posts

  • Cybercriminals Are Now Targeting Business Collaboration Tools
  • 7 Bonuses For Small Business In Microsoft 365
  • Microsoft Teams Premium: Is It Worth It for Your Business?
  • Why You Shouldn’t Ignore Old Email Accounts
  • 6 Quick Tips for Staying Secure in the Age of AI

Recent Comments

No comments to show.

Archives

  • May 2025
  • April 2025
  • March 2025
  • January 2025
  • December 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023

Categories

  • Articles
  • Backup
  • Cybersecurity
  • Guides
  • Microsoft365
  • Top Picks
Copyright 2025 — Herstek & Associates, LLC. All rights reserved. Sinatra WordPress Theme
Scroll to Top