cybersecurity horror movie

The importance of an Annual Risk Assessment

The importance of an Annual Risk Assessment Performing an annual security risk assessment is critical for small businesses for several reasons. A security risk assessment is a comprehensive review of an organization’s security posture, including its systems, processes, and policies, to identify potential risks and vulnerabilities that could be exploited by cyber attackers. Here are…

irs tax scam

Tax Scams: What you need to know

Tax Scams: What you need to know. Each year, scammers come up with new and creative ways to scam taxpayers. Here are a few of the most common tax scams that have been circulating recently, and tips on how to avoid them: Phishing scams: In this scam, fraudsters send emails or text messages claiming to…

new FTC Safeguards rule

FTC Guidelines – what you need to know

FTC Guidelines – what you need to know The Federal Trade Commission (FTC) Safeguards Rule requires financial institutions, including accounting firms, to have measures in place to protect the security, confidentiality, and integrity of customer information. This includes developing and implementing a written information security plan that includes administrative, technical, and physical safeguards appropriate to…

How to create an effective employee handbook

How to create an effective employee handbook

How to create an effective employee handbook Employee Handbooks – Establish and Review with Ease with Nester Insurance A well-designed employee handbook is an invaluable asset for a company to have. It can provide a communication gateway between management and employees concerning employer expectations, policies and company background. In addition, a handbook provides a consistent…

plus one technology IT

Interacting with Plus 1

Here at Plus 1 Technology, we are eager to help our clients find quick and efficient solutions to any tech issues your business may have! SUBMITTING A TICKET Begin by E-mailing support@plus1technology.com OR Call 610-792-5660 and a dispatcher will create a ticket. You will then receive an email confirmation that a ticket has been created…

2 Factor Authentication

The Importance of 2FA

What is 2-factor authentication? Two-factor authentication is when an additional “factor” is required for you to login to a system other than just a password. This is typically a numerical code sent to either a text message or email. It can also be done via a phone call or a mobile app. These solutions can…

cyber insurance

Cyber Insurance

Today we are going to talk about cyber insurance. What is it and do you need it. Cyber Liability insurance is used to provide financial assistance in the event of a cyber-attack. Often your general liability insurance policy or professional liability will contain some basic cyber liability coverage but with the increased risks and potential…

cybersecurity horror movie

Cybersecurity Horror Movies

Cybersecurity Horror Movies It’s October and that means there is only one type of movie you’re allowed to watch. That’s right, horror! Even the scaredy cats like a good horror movie near Halloween whether it’s Scream, Nightmare on Elm Street, Paranormal Activity, or, well, Halloween. But very few horror movies are realistic. People are always…

strong cyber security

Recipe for Strong Cybersecurity

Recipe for Strong Cybersecurity Cookies. Cakes. Pies. Brownies. All fantastic treats to have when you’re feeling down. But you know what the easiest and most satisfying dish to make really is? Strong Cybersecurity! Let’s quickly go over what you’ll need and the steps you’ll need to take to have a truly cyber-safe digital presence! Ingredients:…