Use the “SLAM” Method to Spot Phishing Emails

This video will reiterate how important it is that you and your employees are well-trained to spot malicious emails. In a nutshell, you can use the SLAM Method to help quickly identify suspicious emails. Sender – Check the sender closely. Look for misspelled ...

End of Life for Microsoft Windows 7 & Windows 2008 Server

Microsoft Windows 7 & Windows 2008 Server Have Officially Reached End of Support. You’ve heard us frequently talking about end of support for Windows ...

How To Use @Mentions To Improve Your Email Efficiency

ontributed by Fulcrum Group Systems Engineer, Tyson Rasanen Do you find it extremely time consuming to go through your email in attempts to find your action items? Does it drive you mad going through the 178th email this morning where you ...

SPOT Cybersecurity Tip: What to do BEFORE your laptop is lost or stolen

What Happens if Your Laptop is Lost or Stolen? You just finished a long day at work, you pack up your laptop, and you decide to meet a friend for dinner on the way home from work. After dinner, you ...

Censoring Technology: The pros and cons

As a species we are connected. Our access to information is growing exponentially. Many authorities and governments around the world have concerns about what this access could mean for the people in their countries. These concerns cause them to censor ...