November Newsletter – 2022
Download November 2022 Newsletter Now
Download November 2022 Newsletter Now
RJ2 Perspective Written by: Jeff Dann, President of RJ2 Technologies How to Identify Dangerous Phishing Emails Introduction Phishing is a common scam that involves attempting to trick you into giving away personal, financial, or other sensitive information. It’s done by sending an email or posting a link online to make it look like it’s coming…
DetailsIntroduction Online security is a topic that’s been getting a lot of attention lately. Data breaches are something you never want to happen, but unfortunately, they’re becoming more common. While there’s no way to completely prevent these types of attacks, there are some things you can do to make yourself less vulnerable. The following tips…
DetailsToday, email is one of the most commonly used forms of communication. It’s quick, easy and convenient, but it is also vulnerable to attacks from hackers. Here are some practical tips that can help you secure your email account and keep your information safe. Use Strong Passwords Many email users fail to understand the importance…
DetailsWe need to rethink cybersecurity Cybersecurity is more than just preventing data breaches. It’s about creating a culture of security, making sure your company is prepared for any kind of attack and taking steps to mitigate risk. As an insurance company, you have a unique perspective on cybersecurity. You’re in the business of protecting your…
DetailsDownload October 2022 Newsletter Now
RJ2 Perspective Written by: Jeff Dann, President of RJ2 Technologies Cybersecurity: What is it and why do you need it? Cybersecurity is a complex area of computer security that focuses on protecting systems, data and networks from attacks. A cyberattack is any attempt to gain access to a system or network with malicious intent. Cybersecurity…
DetailsHow to secure your passwords Generate random passwords using a password manager To make the most of your password manager, you’ll want to use a strong and unique password for each account. That’s because if someone gets access to one of your accounts and can then log into another account (which often happens when people…
DetailsIntroduction If you haven’t developed a data backup and disaster recovery plan, now is the time to do so. As we’ve seen in recent years, natural disasters like Hurricane Harvey, tornadoes in Oklahoma, earthquakes in Mexico City and more have left businesses without access to critical information. These events can be devastating—but they don’t have…
DetailsIntroduction Endpoint security is a topic that’s rapidly gaining in popularity. With the increasing number of cyberattacks, it’s now more important than ever to ensure that your company’s data is safe from hackers and malware. Let’s take a look at some of the most important things you need to know about endpoint protection: What is…
Details| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |