Skip to content

Nino Vales

Nino regularly writes tips and articles about Cybersecurity. He holds multiple Cybersecurity certifications (CISSP, CySA+, CyberOps, M365:Security Administrator). During his free time, he loves to go fishing and camping. He is a basketball fanatic and collects limited edition basketball sneakers and jerseys.

The Cloud Called… It’s Time To Migrate Your Phone System!

Read More

Latest Posts

Explainer: What is an MFA Bombing Attack and How to Avoid Being Compromised

Know more about the MFA bombing tactic Many of us already know the importance of having Multi-Factor Authentication or MFA. Enabling MFA gives many users peace of mind against..

Read More

Is It Time to Review Your Cybersecurity Policies?

With recent global developments, we've seen an increased risk to organizations that are not prepared for potential cyber attacks. Learn what to look out for and how to get ahead..

Read More

Webinar with Cisco: 10 Myths for SMB Cybersecurity…Busted!

Missed Cisco and Clear Concepts' live webinar on “10 Myths for SMB Cybersecurity…Busted!”?    Check out the recorded webinar here!

Read More

Things to Remember about Email Passwords

An email account with a simple or weak password puts your information at risk. Confidential attachments, messages, bank information, contact list, or personal conversations could..

Read More

Explaining the 3 2 1 Backup Rule

The more backup copies you have, the better your coverage against losing a full day of work or even worse your entire data. Ransomware, data corruption, accidental deletions, or..

Read More

Cyber Kill Chain & Ransomware

The Cyber Kill Chain model breaks down a Ransomware attack in seven stages. This article will give you an understanding of our security solutions and what is effective based on..

Read More

Protect Yourself Against Macros and Malicious Websites

Macros – they are normally delivered as attachments in the form of a Microsoft Word document. Macros can either make your life easier by automating those repetitive stuff or..

Read More

Protect your Backups from Ransomware

Ransomware scans network locations where the infected user has read and write access. Files under documents, desktop, and the shared folders you have access are examples of..

Read More

Risks of Unsecured Remote Desktop Connections

The ability to connect to your work computer or remote desktop server remotely provides added productivity to some employees. However, the risks of having this incorrectly..

Read More