BLOG Phishing Attacks When An Employee Causes A Data-Breach Jennifer is a rock star employee. She’s always on time. She is friendly, hard-working, and goes the extra mile to make sure she knocks every project out of the park! The CEO adores her! There’s just one thing, Jennifer just cost her company tens of thousands of dollars because she was responsible for [...]
About Joe GoldsteinThis author has not yet filled in any details.
So far Joe Goldstein has created 14 blog entries.
BLOG Joe Goldstein, Cybersecurity Expert Video Chat With Business Coach Gustavo Romero Family guy, Joe Goldstein gives an overview on how his career in IT and cybersecurity began; including how he got started in the field, how he progressed into cybersecurity and healthcare IT, and his transition to where he is today at OCS IT. OCS IT’s humble beginnings started [...]
BLOG Should I Hire IT Staff Or Outsource My IT? When you have a business, you know you need IT services. This may not be in your realm of expertise. Therefore, you want someone to come in and take care of this for you, so you can run your business without worry! But what is the next step? Let’s break this down so [...]
BLOG Are You A Victim Of "Computer Guy" Abuse? Does your current computer guy fix things, then make fun of you? Does he tell you to "MOVE, I'll fix it"? When you hang up, do you feel like a nitwit just because you asked for support THAT YOU PAY FOR? If you are experiencing some of these difficulties, know you are not alone, [...]
BLOG Security Training Recommended While Working Remote Humans Are The Weakest Link One of the seismic shifts in the business world caused by Covid-19 is the quick adoption of a remote workforce. With cubicles replaced by couches and communication relegated to the realm of cyberspace, the entire workplace has shifted into our living rooms, dining rooms, and home offices. A distributed workforce [...]
BLOG Coronavirus and Remote Access As the world continues to fight the Coronavirus outbreak, the primary way we have been told to reduce the spread is social distancing. For many businesses, that means allowing staff to work from home through remote access. Remote access is when a connection is made to an organization's internal network. This allows you to use your office computer [...]
BLOG How To Avoid Being Phished Every day, cybercriminals are constantly trying to manipulate your and your staff's behavior. They do this by using a stream of emails, texts, and social media messages pretending to be a well-known organization or a friend. Their end game is to trick you into clicking on links or attachments that have hidden malware. The statistics of phishing [...]
BLOG Cybersecurity Training Is The Best Defense To Err is Human Did you know that 95% of security breaches are caused by human error? Cybercriminals attack organizations daily, and their primary target is you and your employees! The best way to fight back is to implement strong cybersecurity training programs and make it a key component of your corporate culture. Think about this - 45% of [...]
BLOG Antivirus: The Myths and The Reality Although having smart digital habits are an important line of cyber-defense, antivirus solutions are another important tool for data security. Yet, when it comes to antivirus software, users tend to be extreme in their assumptions. Some believe that installing an antivirus is the only thing that protects data from being hijacked. Other users don’t install antivirus [...]
BLOG Why You Need A Password Manager Why Do I Need A Password Manager? The average internet user has tens if not hundreds of different types of accounts. By 2020 it is predicted that the average user will have at least 207 individual accounts. No one can create or remember that many passwords without help. After all, you can only create so [...]