Our Insights

Valuable information we share.

Nino Vales

Nino regularly writes about tips and articles about Cyber Security. He currently holds dual CCNA certification in Routing and Switching, and CyberOps. During his free time, he loves to go fishing and play basketball. He is a huge NBA fan and loves to collect limited edition basketball sneakers and jerseys. He currently plays NBA 2K19 in his PS4.

Recent Posts

Things to Remember about Email Passwords

An email account with a simple or weak password puts your information at risk. Confidential attachments, messages, bank information, contact list, or personal conversations could fall into the wrong hands if an email account gets hacked due to a weak password.
Read More

Explaining the 3 2 1 Backup Rule

The more backup copies you have, the better your coverage against losing a full day of work or even worse your entire data. Ransomware, data corruption, accidental deletions, or environmental disasters, are just some of the dangers lurking to destroy your backups. Recovering data off dead drives costs lots of money, and that can easily be avoided if you have an effective backup strategy in place.
Read More

Cyber Kill Chain & Ransomware

The Cyber Kill Chain model breaks down a Ransomware attack in seven stages. This article will give you an understanding of our security solutions and what is effective based on the current stage of the Ransomware. 
Read More

Protect Yourself Against Macros and Malicious Websites

Macros – they are normally delivered as attachments in the form of a Microsoft Word document. Macros can either make your life easier by automating those repetitive stuff or destroy all of your work in seconds. It is exploited by attackers to infect systems and make demands against the victim.
Read More

Protect your Backups from Ransomware

Ransomware scans network locations where the infected user has read and write access. Files under documents, desktop, and the shared folders you have access are examples of locations vulnerable to getting encrypted. Imagine if an administrator account or someone using an account that has full read and write access to the server gets infected. Easily, everything on the server and the network will be affected. It can halt the operations and affect the productivity of not just one person but the entire organization.
Read More

Risks of Unsecured Remote Desktop Connections

The ability to connect to your work computer or remote desktop server remotely provides an added productivity to some employees. However, the risks of having this incorrectly configured outweigh the convenience it provides.
Read More

Cloud or Local Backups? Why not both?

A reliable backup does not have to be expensive or complicated. Backup storage evolved from punch cards to using the Cloud. The objective remains the same, protect your data from unexpected data loss or provide recovery from disasters.
Read More

How much information is shared with your Facebook Apps and how to remove them

How much do Facebook Apps know about you? Privacy has always been a concern when having a social media profile. Major platforms generally require your Full name, Email Address, and Date of birth before you can sign up for an account. That information will help verify your identity and ensure you are a real person and not a bot account.
Read More

Quick Tips to Prevent Ransomware (and what to do if you get hit)

Over the last two years there has been a growing number of Ransomware attacks happening all over the world. We should learn of the dangers and how to avoid getting affected by it.
Read More

Phishing Emails and How to Protect Yourself

We have seen a significant increase in the volume of Phishing emails being sent globally. The trend is expected to rise and users should be prepared and educated on how to identify emails from what is legitimate or not.
Read More