Uncategorized

Be Smart and Protect Your Data!

Be Smart and Protect Your Data!

Be Smart and Protect Your Data! By Patrick Logan, President of Seltek The need to have a secure data backup has never been more critical to businesses, especially for smaller, more vulnerable organizations. Data can be compromised in many ways Learn more
Be more secure…use Two-Factor Authentication

Be more secure…use Two-Factor Authentication

What is Two-Factor Authentication? by Oscar Luna, IT Support Specialist In today’s digital age, it is important to implement a layered security strategy, both personally and professionally. Two-factor authentication is an easy, secondary method of securing accounts. Normally users have Learn more
What Is Cyber Liability Insurance?

What Is Cyber Liability Insurance?

Written by Kara Mueller, IT Support Specialist, Certified Computer Examiner WHAT IS CYBER LIABILITY INSURANCE? Cyber liability insurance covers liability and financial losses that result from data breaches and other cyber events. It can cover legal fees, notifying customers about a Learn more
Electronic Pickpocketing

Electronic Pickpocketing

Written by James Overby, Seltek Helpdesk Intern What is “Electronic Pickpocketing” and how does it happen? “Electronic pickpocketing,” also known as “Digital Pickpocketing, “ is a process in which a target’s credit card information is stolen in a public setting Learn more
Juice Hacking: Hacking in Plain Sight

Juice Hacking: Hacking in Plain Sight

What is “Juice Jacking”? Written by James Overby, Seltek IT Intern “Juice Jacking,” also known as “Juice Filming,” is a type of cyber-attack introduced within the past 5 years, involving cell phone chargers that serve as a data connection for Learn more
Computer Buying Tips for your High School Grad

Computer Buying Tips for your High School Grad

  COMPUTER BUYING TIPS It’s that time of year, seniors everywhere are preparing for graduation.  Congratulations to the Class of 2019! Along with celebrations, many Moms and Dads (and seniors) are starting to look at what kind of computer is Learn more
Microsoft Ending Support for Windows 7

Microsoft Ending Support for Windows 7

MICROSOFT ENDING SUPPORT FOR WINDOWS 7 by Juanita Nester, IT Support Specialist Someone once said, “All good things must come to an end,” and that applies to technology too. After January 14, 2020, Microsoft will no longer provide security updates Learn more
Cyber Security: How Do I Protect My Business From a Data Breach

Cyber Security: How Do I Protect My Business From a Data Breach

CYBER SECURITY: HOW DO I PROTECT MY BUSINESS FROM A DATA BREACH By Patrick Logan, President and Certified Computer Examiner What is Cyber Security? Cyber Security (or Data Security) concerns the protection of data from accidental or intentional, but unauthorized Learn more
Why Digital Forensics Matters to You

Why Digital Forensics Matters to You

WHAT IS DIGITAL FORENSICS? Digital Forensics can be defined as the investigation, recovery and analysis of data and evidence within digital devices (computers, smartphones, etc.).  Digital forensic investigations should only be performed by trained and certified examiners who can ensure Learn more
Don’t Be a Victim of Whaling

Don’t Be a Victim of Whaling

Anyone can be a victim of a cyber fraud attack, including senior executives.  A “whaling” attack is where cyber criminals attempt to “harpoon” an executive, often CEOs and CFOs, and steal log-in credentials.  In the event their attack proves successful, Learn more