Wave It On Blog

What is an IT Roadmap: 4 Tips to Help You Create Your Own

Did you include an IT roadmap in your business's 2019 plans and budget?

Read more

5 Tips to Protect Your Data this Holiday Season

Now that the holiday season is in full swing, many of us are taking advantage of online shopping to get our holiday shopping done. Convenience is a major factor in this, as it saves you from having to go to crowded malls and wait in ridiculously long lines, as well as the fact that it makes it super easy to shop around and get the best price for whatever you are buying.

Read more

Phone Spoofing - 3 Tips to Address It & What to do if Your Number is Spoofed

Nowadays, spoofed phone calls are fairly common, and there’s a good chance that you have received more than one of them. You may have noticed that many of the spoofed calls you receive come from numbers that are similar to your own, with the same area code and first 3 numbers of your own phone number. This is called neighbor spoofing. Con artists and robocallers use these numbers because they look to you like they are coming from a neighbor, friend, or local business, and you may be more likely to answer calls if you think that they are from someone you know.

Read more

Windows 7 End of Life

Windows 7 is on its way out, as its End of Life date is quickly approaching. While January 14th, 2020 may seem far away, its important to start planning now. If you don’t, you could find yourself having to scramble to upgrade or replace all Windows 7 PCs at the last minute, which can get very expensive very quickly.

Read more

What is the Internet of Things: Three Fast Facts & Associated Risks

Read more

Three Common Password Mistakes to Avoid

Unfortunately, the combination of your dog’s name and your birth year is not a secure password combination.

While we think that we’ve created a fool-proof password for our online accounts, odds are we’ve committed not just one but maybe all of the common password security mistakes. Read more

What is a WISP and the Repercussions of Not Having One?

A Written Information Security Program (WISP) is a document that’s essentially a layer of protection that safeguards personally-identifiable information that’s been shared with a business entity.

Read more

Single Sign-on Authentication: What is it?

Imagine coming into work and only having to put in one password. That’s it – one login that gives you access to all of the programs that you use on a daily basis. That may sound farfetched, especially if you are used to having to memorize an endless number of passwords in order to access the various programs that you use, but it does exist. It’s called Single Sign-on authentication (or SSO for short).

Read more

IT Risk Management Best Practices: What Should You Be Doing?

Devising and implementing a risk management strategy is a proactive approach to addressing potential IT threats and problems for your company as cyber criminals are becoming more sophisticated with their attacks.

Read more

What is Ransomware? Three Ways to Protect Your Computer

Ransom : a consideration paid or demanded for the release of someone or something from captivity.

Read more
1 2 3 4 5

Recent Posts

Categories

see all