December Newsletter – 2022
Download December 2022 Newsletter Now
ROI Revolution estimates that e-commerce sales will eclipse $236 billion this holiday season. While that’s the most popular time for consumers to purchase online, in 2021 over $2 billion a day was made in online purchases. Chances are you and your employees make purchases weekly personally and for your business. And…chances are that cybercriminals are…
RJ2 Perspective Written by: Jeff Dann, President of RJ2 Technologies How Vulnerability Scans, Penetration Testing, and Zero Trust Security Will Help Protect Your Business: Introduction Cybersecurity is an important issue for any organization that relies on the internet or computer systems. While most organizations already have a basic level of security in place, it’s important…
Introduction Cyber-crimes are becoming increasingly common, and Black Friday and Cyber Monday are prime times for criminals to strike. While online shopping can be fun and rewarding, it’s also important to keep your data safe from cybercriminals. In order to protect yourself during these busy holidays, here are some helpful tips: Look for the padlock…
The last few years have seen countless companies going to a hybrid work model. According to a survey by Envoy over 77% of businesses have some full or part-time remote employees. While this change comes with many benefits, as a business owner, there are three big things you need to make sure your employees are…
Introduction Cybersecurity is an important issue for any organization that relies on the internet or computer systems. While most organizations already have a basic level of security in place, it’s important to test your network security. That’s because hackers are constantly developing new ways to attack networks and break into systems. The best way to…
No company is safe from disaster. For example, a ransomware attack, a fire, or an unplanned power outage can cause your small- or medium-sized business (SMB) to go offline and lose revenue. In order to protect your company from these unexpected events, it’s important to have a business continuity plan (BCP) in place. This blog…
RJ2 Perspective Written by: Jeff Dann, President of RJ2 Technologies How to Identify Dangerous Phishing Emails Introduction Phishing is a common scam that involves attempting to trick you into giving away personal, financial, or other sensitive information. It’s done by sending an email or posting a link online to make it look like it’s coming…
Introduction Online security is a topic that’s been getting a lot of attention lately. Data breaches are something you never want to happen, but unfortunately, they’re becoming more common. While there’s no way to completely prevent these types of attacks, there are some things you can do to make yourself less vulnerable. The following tips…
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |