FOUR WINDS BLOG

The latest in technology resources and news.

Ransomware Attacks are Inevitable, Being Vulnerable Doesn’t Have to Be

Posted May 29, 2018 by Communications

 

No Comments

filed under: IT security, Cloud and Local Backup Solutions

10 Reasons to Educate your Front Line in Cyber Security – Part 2

Posted May 14, 2018 by Communications

Four Winds’ last blog left off on the fifth reason for investing in cybersecurity training – ALL companies, both large and small, can be the target of hackers.

No Comments

filed under: IT security, Managed Services

Cybersecurity: A Game Plan for a Successful Business

Posted April 26, 2018 by Communications

 

No Comments

filed under: IT security

Does your C-Suite See Eye to Eye?

Posted April 10, 2018 by Communications

Most CEOs cite malware as the greatest cybersecurity risk while their technical officers see identity breaches as the greater threat. This C-suite disconnect can lead to weak IT decisions that do not reflect or address the true primary threats each individual company is facing. In a survey 0f...

No Comments

filed under: IT security

Security Event vs. Security Incident  

Posted April 5, 2018 by Communications

Security ‘events’ and security ‘incidents’ happen every day in all businesses. What’s the distinction between the two? An ‘event’ is a broad term that describes anything that has significance for system hardware or software, the level of risk associated with the event determines whether or not it...

No Comments

filed under: IT security

7 Tips to Create Unhackable Passwords

Posted June 8, 2017 by Dan Madigan

With all of our activity on the Internet, both personal and business, it is possible to have tens if not hundreds of sites with your credentials. All too often we see weak passwords , so, how can you create strong passwords that will keep your online and local accounts safe? Here are several...

No Comments

filed under: IT security

Questions to Ask When Committing to Cybersecurity

Posted January 19, 2017 by Dan Madigan
No Comments

filed under: IT security, Managed Services