Don’t forget your phone when you think about cyber security

Our phones are a goldmine of private information. If they’re not as secure your other devices, they can become a gaping hole in your cyber security

By |2024-03-03T17:22:07+00:00March 13th, 2023|Uncategorized|Comments Off on Don’t forget your phone when you think about cyber security

Cyber Security – Risky Security Habits in your Business

Slick Cyber Systems helps small businesses recognize problem areas. Some of the top security mistakes that leave small businesses vulnerable to breaches and compliance audits. Included below are several tips to help keep small businesses and their customers’ information secure.

By |2024-03-03T17:30:23+00:00March 24th, 2019|Blog Posts, News & Events, Uncategorized|Comments Off on Cyber Security – Risky Security Habits in your Business

What is Shadow IT?

The important thing to remember is your company IT dept. still has to maintain some degree of control over the applications used and where sensitive data is stored. Unfortunately, many users just download apps or start using unsanctioned services, though, and introduce security risks through “shadow IT. or "Shadow Cyber IT”

By |2024-01-26T15:20:22+00:00March 24th, 2019|Blog Posts, News & Events, Uncategorized|Comments Off on What is Shadow IT?

How to protect your business from cyber crime

An alarming trend of high profile security breaches seems to be happening almost daily. So what should you do? Well if you are the Owner, CEO or Executive of a business, you need to pay attention to this trend. You can’t just sit back and hope that your business won’t be the next victim.

By |2024-03-03T17:39:34+00:00March 24th, 2019|Blog Posts, News & Events, Uncategorized|Comments Off on How to protect your business from cyber crime

What you need to know about ransomware?

Recently we got a call from a business who was affected by Ransomware. A user with the business reported that received an email from a supervisor, with an attached invoice. When they opened the invoice it started the process of allowing the Malware to make changes on the PC to encrypt the files and spread across the network to other PCs and the server.

By |2024-01-26T15:45:33+00:00March 24th, 2019|Blog Posts, News & Events, Uncategorized|Comments Off on What you need to know about ransomware?
Go to Top