Connecting Point Blog

Get the latest company updates, technology news, and expert advice

Blog

The threat of distributed spam distraction

You wouldn’t think that cybercriminals would carry out their nefarious schemes in plain sight — except that they do and you’ve probably already fallen victim to them. Learn all about a scheme called distributed spam distraction (DSD) and how malicious actors are using it to steal valuable information from their victims.

SMB Cybersecurity: What to Know

The pandemic has created a rise in remote work, online shopping, and people becoming more digitally connected than ever. While these trends can be seen as positive changes, there is also a lot of potential for negative impact.

The biggest issue being that cyberattacks have since skyrocketed.

5 Ways to optimize your new laptop

So you’ve just unboxed your brand new laptop — what do you do next? Before you start using it to surf the internet or finish your tasks for the day, take these steps to optimize its performance and ensure it meets your needs. 1. Update your laptop’s operating system One of the first things you […]

Dalton Petsch Earns CompTIA Security+ Certification

August 2020 - Connecting Point’s Dalton Petsch recently received his CompTIA Security+ Certification which is a core certification for IT security professionals. This certification track provides expertise and training around the latest trends in risk management, risk mitigation, threat management and intrusion detection.

Use Gmail with ease with these 5 tips

Gmail’s email management interface is a crowd favorite, owing to its pleasant aesthetics and intuitive design. But did you know that you can still take your Gmail experience up a notch? Try the following tricks. Undo Send In the fast-paced world of business, mistakes happen.

It’s time to rethink your password strategy

In 2003, the National Institute of Standards and Technology (NIST) stated that strong passwords should consist of upper- and lowercase letters, numbers, and symbols. Recently, however, the institute reversed its stance. Find out why and learn what their new recommendations are for creating strong passwords.

Are you HIPAA-compliant? 4 Things to look into

Medical records are extremely private and their exposure could lead to negative consequences such as social stigma and job discrimination. The Health Insurance Portability and Accountability Act (HIPAA) protects this information and grants patients the right to view their own health information so that they can enjoy more control over their care.

Obsolete firmware poses security risks

Are you still hanging on to your old work computers since they “still work fine”? While they may still help you get the job done, their outdated firmware can make you vulnerable to security risks that can lead to major problems. What is firmware? Firmware is a basic type of software that is embedded into […]

4 Tech-Related Trends Helping Businesses Tackle the COVID Crisis

The pandemic presents challenges many business leaders have never confronted.
By being proactive in 5 priority areas, business leaders can better respond to sudden disruptions, maintain continuity as new challenges emerge, and realize a quick and competitive recovery after the crisis:
Enable aspects of remote functionality
Remote work has long held a stigma for being exclusive to certain industries.

Set up a productive, efficient, and secure remote team that can help you run your business anywhere. Download our free eBook today to learn how!Download here
+