SomethingCool.com LLC - Making IT Personal Since 2000

blog

9 Signs That an Email Might Be a Phishing Scam

July 20, 2016
|

Phishing attacks are still a weapon of choice for cybercriminals. The most common way they carry out phishing attacks is through email messages. In email phishing scams, digital con-artists use a convincing pretense to lure you into performing an action — usually opening an attachment or clicking a […]

Read more

How to Test Your Backups

July 20, 2016
|

Regularly backing up your business’s files and computer systems is crucial, but it is just as important to test those backups at least once a year. You do not want to find out that your backup images or files are corrupt and thus useless when you are […]

Read more

HSS Issues Guidance for Ransomware Attacks

July 18, 2016
|

The Department of Health and Human Services issued guidelines this week that could require doctor offices and clinics to notify users and the HHS if they were a victim of a ransomware attack.

The guidelines stress that implementing security compliance, as part of HIPAA and Hi-TECH, can […]

Read more

How to Keep Your Company’s Network Secure

July 8, 2016
|

How secure is your company’s network? Protecting your information assets is one of the most important steps you can take toward long-term stability. Smart companies take a multifaceted approach to IT security, building layers of defense between themselves and hackers.

Here are four steps you can […]

Read more

4 Factors to Consider When Choosing a Data Backup Service Provider

Regularly backing up your data is crucial. After all, the loss of your data can interrupt daily operations and might even grind your business operations to a halt. Given the importance of data backups, finding the right data backup service provider for your company might seem difficult. However […]

Read more

Insider Threats: How to Counter Internal Cybersecurity Risks

July 6, 2016
|

If you ask people about cybersecurity, they will probably start talking about hackers breaking into a company’s computers from hundreds of miles away. However, a threat just as destructive could be hiding inside that company’s offices.

These insider threats typically fall into two groups. The first […]

Read more

How to Protect Your Personal Information from Hackers

June 15, 2016
|

Hackers want to get to know you better — and it is not because they want to be your friend. Besides seeking basic information about you (e.g., name, email address, birthdate), they want to get details about your life, such as where you live and work, your hobbies […]

Read more

The Private Cloud: What It Is and Whether It Is Right for Your Business

June 15, 2016
|

As a business professional, you are likely familiar with public clouds such as Office 365, Google Apps, Dropbox, and Amazon Web Services. But are you as familiar with private clouds? If you answered “No”, you are not alone. Many people do not know much about them. It does […]

Read more