If you’re using cloud applications while your employees are working from home, you are justified to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. Here are a few things you can easily […]
Author Archive | Patrick Lindenmuth
Don’t forget about physical security!
The greatest threats to your company and its data come from hackers and cybercriminals. It’s just as important, however, to ensure the physical security of your devices while working from home. Implement these recommendations: Shut down your device and store it in a secure place before leaving your home for any reason. Lock your computer […]
Don’t do THIS on your work laptop or PC
It’s easy to become a little more relaxed when working from the comfort of your living room or home office. Surfing over to Facebook, other social media, or even personal e-mail accounts can be very tempting. But the only thing you should use your company’s workstation or laptop for is … work! Check your personal […]
The one document you should have in place for times like these
Working from home poses various risks to your company, its data, and its livelihood. Although your employees may have the best of intentions, establishing a Work From Home Policy reduces these risks by providing them a clear set of guidelines and procedures. You should consult with an IT expert, along with your HR attorney, to […]
Are your employees leaving this backdoor wide open?
Most of your employees have wireless networks set up in their homes. Unlike your business Wi-Fi, many home users are lax about creating secure wireless networks – leaving a backdoor open to hackers. Wi-Fi signals often broadcast far beyond your employees’ homes and out into the streets. Drive-by hacking is popular among cybercriminals today. A […]
The DANGERS of Dropbox and other file sync apps
When employees work from home, they need access to important company files. It’s easy to look at consumer-grade, cloud file sharing solutions like Dropbox, OneDrive, and Google Drive. But listen up! These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information […]
Improve your password strategy
When in worldwide crisis like a pandemic or large-scale natural disasters, your passwords could mean the difference between spending your time re-learning how to grow your business and trying to recoup finances and private data that’s been hacked. Steps you can take to protect your passwords: Review your current passwords and inform your team to […]
Working from home? DON’T DO THIS!
Because your employees may be required to work from home, their mindset may be, “I may as well use my home computer.” This is a dangerous mistake. Home computers and personal mobile devices could be littered with tons of downloaded music, videos, images, and more. Because it’s more exposed, it can invite malware into your […]
How to Spot a Phishing Email
It’s the perfect time for hackers to send e-mails with dangerous malware and viruses. Right now, your inbox is probably filled with “COVID-19” subject lines and coronavirus-focused e-mails. Hackers are even using fake CDC-gov e-mail addresses that are not legitimate and spamming inboxes. How can you tell a phishing e-mail from a legitimate one? Here’s […]
UPDATE: Security Alert: Beware Microsoft Word Attachment Zero-Day Exploit
We have received an update regarding a recent article posted to our site: (Link to previous article: https://www.acetechgroup.com/security-alert-beware-microsoft-word-attachment-zero-day-exploit/) Microsoft has released updates to patch the zero-day vulnerability of their Windows operating systems that had been reported on over the last week (KB4015546, KB4015547, KB4015549, KB4015550). Check out this link from Microsoft, which contains more information on the […]