TelStrong

Blog

Today's Tech Tip 10-11-18

You’re sitting at your computer and for some reason, your email can’t login. Minutes later, you get a phone call from a co-worker saying that they can’t open the file you just sent them. Stranger yet, your spouse calls you ...

Today's Tech Tip 10-10-18

It’s late in the evening and you need to connect to the company network to complete some work. You accidentally left your company issued laptop at the office. You could easily connect remotely from your family computer. You think the ...

I have my DD-214, now what?

First things first, no one owes you anything. If you want to make it in business you have to realize it’s dog eat dog, there is no brotherhood (unless you forge ...

Today's Tech Tip 10-09-18

It’s just another Tuesday on your way to work and you stopped by your favorite busy coffee shop to get your caffeine fix. You set your laptop down to add the cream and, when you turn back, your laptop is ...

Today's Tech Tip 10-08-18

Did you know that the #1 threat to your cybersecurity is you? The computer user can unintentionally invite hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without ...

Today's Tech Tip 10-05-18

Do you use public WiFi with your laptop or mobile device?  Many people do. It’s important to understand that public places are prime targets for attackers. There are many types of attacks that can happen in public, while most are ...

Today's Tech Tip 10-04-18

You’re working at your desk and you get a phone call that starts something like this: “Hi this is George from Microsoft tech support, I am calling because we have detected a virus on your computer” What do you do? ...

Today's Tech Tip 10-03-18

Armies of attackers get up every morning with ONE goal in mind: to find computers that are not protected against known vulnerabilities. When a new patch is announced, it’s like a starting gun for attackers who begin to look for ...

Today's Tech Tip 10-02-18

Ransomware works by encrypting your files to prevent you from using or accessing them. After your files are compromised, the attacker will then pop up a demand screen asking for payment within a set time frame. Some people who have ...

Bastion Building & Constructing Contingencies

Week 1 of NCSAM starts at home, with the topic “Make Your Home a Haven for Online Safety”. The overarching theme ...