Lessons Learned From The Colonial Oil Pipeline Attack

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

May 6, 2021 will be a day that goes down in history. This is the day the Colonial Oil Pipeline went down, causing a nationwide disruption. Even though the pipeline only services a portion of the east coast, the effects of the shutdown was felt across the country.

Gas prices skyrocketed, lines at gas stations were so long it took hours to get through, and gas stations were pumped dry as people bought gas and put it in whatever container they could gather just to assure themselves they would have enough to get through the closure.

If you think about it, this type of ripple effect is not confined to energy and utility providers. While the scale of the effect would not be at the level of the pipeline, the devastation it could leave in its wake for your business and your customers is just as likely. [Continue reading]

An Easier Way To Secure Your Password

Between new threats and new tech, security is something that can always be improved upon to make sure your systems are as secure as possible. Passwords are the first level of security, and the area that seems to cause the most headache for end users … [Continue reading]

Don’t Let Working From Home Lower Your Guard

When working from home or taking online classes for school, it is very easy for us to get caught up in our work and forget about the potential risks of using the Internet. Whether you are using Zoom, assisting clients, writing assignments, or even … [Continue reading]

Changing Your Password Has Changed

If you didn’t know, changing your password regularly is so 2018. No, as ever in the world of tech, things have moved on and there are better, easier ways of doing it now. We’re not suggesting you stick with the same password you’ve been using for … [Continue reading]

Social Media: Friend Or Fraud?

Hopefully you’re aware of the risks of fake accounts on social media. Accounts are created to catfish; con people out of money; and for other kinds of exploitation. But did you know that fake accounts can be created for other services too? Most … [Continue reading]

What’s Your Pocket-Sized Security Threat?

You guessed it. I’m talking about phones. How many people in your business have a company-issued phone, or use their own to access company data like emails, client information, or documents? It’s probably a high number, right? And your phone is … [Continue reading]

The Internet Of Things Can Poke Holes In Your Network

Some business owners spend a lot of time protecting their network. After putting a firewall in place, configuring security settings, and setting up users with complex passwords (and possibly even 2FA), it’s easy to think that’s secure enough. Now, … [Continue reading]

Companies Must Address Employees’ Lax Cybersecurity Habits

A third of employees picked up bad cyber security behaviors while working from home, according to Tessian’s Back to Work Security Behaviors report. Despite the remote workers’ bad security practices, 9 out of 10 organizations prefer the hybrid … [Continue reading]

Three Scary Questions To Ask About Your Data On Your Staff’s Phones

More and more businesses encourage staff to use their own personal cell to access company data. It’s very convenient and cost effective for everyone. Isn’t that the point of having all your data and apps in the cloud? You can access anything … [Continue reading]

Your Business Is Already Under Attack

Ransomware is big business. It’s one of the fastest growing online crimes. Cyber criminals are targeting small and medium sized companies as well as non-profits and government agencies. It’s the computer crime where your data is encrypted so you … [Continue reading]