IT Consulting Advice: Improve Employee Credential Handling
Cybersecurity | Cybersecurity Tips | Uncategorized | Work From Home

IT Consulting Advice: Improve Employee Credential Handling

What’s the number 1 rule of Credential Handling? Say it with us: Don’t re-use the same password across multiple web services!  Unfortunately, employees frequently break this rule of  IT Consulting, across both personal and professional IT support practices. This, combined with the fact that often employees use their work email as their web service usernames,…

Work From Home Cybersecurity Tips
Cybersecurity | Cybersecurity Tips | Work From Home

Work From Home Cybersecurity Tips

With many of us still working from home, it’s easy to get into bad cybersecurity habits that could put your company’s data at risk. As seasoned IT consultants, we’ve used these work from home cybersecurity tips to mitigate risk during the pandemic and beyond! Share these tips with your employees to ensure each person is…

Cybersecurity 101: Get the Protection You Need
Cybersecurity | San Diego | Small Business

Cybersecurity 101: Get the Protection You Need

Typical IT support companies aren’t always great at providing the services you need to give your company protection due to their break/fix business model: something breaks, they fix it, and then they charge you. We, on the other hand, believe in empowering our clients through sharing our expertise and providing unlimited services (at no extra…

5 IT Risks That You’re Exposing Your Business To
Cybersecurity | IT Services | Small Business

5 IT Risks That You’re Exposing Your Business To

In the 22 years that Connetic has been performing cybersecurity audits, we have built a very mature cybersecurity audit and incident-handling practice. Our capability in finding every security vulnerability that affects a company provides transparency into what our customers need to fix in their environments. This dramatically reduces the risk of costly losses associated with…

Getting to Know the Dark Web to Protect Your Business
Cybersecurity | Small Business

Getting to Know the Dark Web to Protect Your Business

In order to best protect your company from shady online activity, you need to familiarize yourself with the basics. Learn about the different players involved in the dark web to better recognize vulnerabilities in your own system. Breachers The first bad actors in the dark web value chain are called “Breachers”—and they don’t actually steal…

Why Do Hackers Bother with Small Business Data?
Cybersecurity | Small Business

Why Do Hackers Bother with Small Business Data?

In our security practice at Connetic, we’re often baffled by the range of approaches to security we see from business owners. Some are highly controlled while others frequently throw caution into the wind until something goes awry. We’ve determined that the attitude towards data security has more to do with the leader’s personality than with real…

How Your Employees’ Password Habits Will Get You Hacked
Cybersecurity | Small Business

How Your Employees’ Password Habits Will Get You Hacked

There’s a security failure that at least 25% of your employees are engaging in right now, and it’s highly likely that you’re guilty of doing it too. Weak passwords are a bad habit that will put your company at risk of being instantly hacked, rendering all of the money you’ve spent on security useless.  Hackers…