Our Insights

Valuable information we share.



Nino Vales

Nino regularly writes about tips and articles about Cyber Security. He currently holds CCNA certifications in Routing and Switching, and CyberOps. During his free time, he loves to go fishing and play basketball. He is a huge NBA fan and loves to collect limited edition basketball sneakers and jerseys.

Recent Posts

Is It Time to Review Your Cyber Security Policies?

With recent global developments, we've seen an increased risk to organizations that are not prepared for potential cyber attacks. Learn what to look out for and how to get ahead of the next threat to your organization's data.
Read More

Webinar with Cisco: 10 Myths for SMB Cybersecurity…Busted!

Missed Cisco and Clear Concepts' live webinar on “10 Myths for SMB Cybersecurity…Busted!”?    Check out the recorded webinar here!
Read More

Things to Remember about Email Passwords

An email account with a simple or weak password puts your information at risk. Confidential attachments, messages, bank information, contact list, or personal conversations could fall into the wrong hands if an email account gets hacked due to a weak password.
Read More

Explaining the 3 2 1 Backup Rule

The more backup copies you have, the better your coverage against losing a full day of work or even worse your entire data. Ransomware, data corruption, accidental deletions, or environmental disasters, are just some of the dangers lurking to destroy your backups. Recovering data off dead drives costs lots of money, and that can easily be avoided if you have an effective backup strategy in place.
Read More

Cyber Kill Chain & Ransomware

The Cyber Kill Chain model breaks down a Ransomware attack in seven stages. This article will give you an understanding of our security solutions and what is effective based on the current stage of the Ransomware. 
Read More

Protect Yourself Against Macros and Malicious Websites

Macros – they are normally delivered as attachments in the form of a Microsoft Word document. Macros can either make your life easier by automating those repetitive stuff or destroy all of your work in seconds. It is exploited by attackers to infect systems and make demands against the victim.
Read More

Protect your Backups from Ransomware

Ransomware scans network locations where the infected user has read and write access. Files under documents, desktop, and the shared folders you have access are examples of locations vulnerable to getting encrypted. Imagine if an administrator account or someone using an account that has full read and write access to the server gets infected. Easily, everything on the server and the network will be affected. It can halt the operations and affect the productivity of not just one person but the entire organization.
Read More

Risks of Unsecured Remote Desktop Connections

The ability to connect to your work computer or remote desktop server remotely provides an added productivity to some employees. However, the risks of having this incorrectly configured outweigh the convenience it provides.
Read More

Cloud or Local Backups? Why not both?

A reliable backup does not have to be expensive or complicated. Backup storage evolved from punch cards to using the Cloud. The objective remains the same, protect your data from unexpected data loss or provide recovery from disasters.
Read More

How much information is shared with your Facebook Apps and how to remove them

How much do Facebook Apps know about you? Privacy has always been a concern when having a social media profile. Major platforms generally require your Full name, Email Address, and Date of birth before you can sign up for an account. That information will help verify your identity and ensure you are a real person and not a bot account.
Read More