Our Insights

Valuable information we share.

 

 

Adopting MFA Series Part 3: Implementing MFA in Microsoft 365

In the 3rd and final part of our MFA series, we'll take a look at how MFA is enabled in Microsoft 365.  Take a deep breath - you've got this!
Read More

Adopting MFA Series Part 2: MFA Apps

In part 2 of our "Adopting MFA" series, we'll take a quick look at a few of the most popular authentication apps available today.  
Read More

Adopting MFA Series Part 1: What is MFA?

Wondering if you should bring Multi-factor Authentication (MFA) into your organization?  If you're on the fence and not sure how MFA improves account security, start here.
Read More

Still Running Windows 7? Time to Upgrade!

Windows 7 support ended on January 20, 2020.If you are still using it, consider moving to Windows 10 now! Here's why:
Read More

7 Tips to Identify Phishing Emails

We have all received a suspicious email in our inboxes before. Even so, knowing if these messages are coming from a legitimate company, or if the source is one that is impersonated, isn't always a black and white situation.  Check out this infographic that contains some of our security expert's tricks to avoid falling victim to a phishing email.
Read More

Stay Safe Online with these Cybersecurity Tips

Staying safe online doesn't need to be complicated.  Check out this infographic that contains some of our favorite cybersecurity tricks to help you stay safe online at home and at work.
Read More

Webinar with Cisco: 10 Myths for SMB Cybersecurity…Busted!

Missed Cisco and Clear Concepts' live webinar on “10 Myths for SMB Cybersecurity…Busted!”?    Check out the recorded webinar here!
Read More

Things to Remember about Email Passwords

An email account with a simple or weak password puts your information at risk. Confidential attachments, messages, bank information, contact list, or personal conversations could fall into the wrong hands if an email account gets hacked due to a weak password.
Read More

Latest Email Threats: Homograph Exploits and Extortion Scam

Regular SPAM filtering just isn’t as effective as it used to be. We live in a time where threats are evolving on a global scale, rapidly working to disarm even the best email filtering solutions. Time and time again, new exploits of Phishing and Spoofing are designed to take advantage of the human condition.  Here are two of the more advanced tactics currently being utilized to gain access to private data or extort money:
Read More

Cyber Kill Chain & Ransomware

The Cyber Kill Chain model breaks down a Ransomware attack in seven stages. This article will give you an understanding of our security solutions and what is effective based on the current stage of the Ransomware. 
Read More