How to Identify Dangerous Phishing Emails

RJ2 Perspective  Written by: Jeff Dann, President of RJ2 Technologies How to Identify Dangerous Phishing Emails  Introduction Phishing is a common scam that involves attempting to trick you into giving away personal, financial, or other sensitive information. It’s done by sending an email or posting a link online to make it look like it’s coming…

Details

4 Tips to Improve Your Online Security

Introduction Online security is a topic that’s been getting a lot of attention lately. Data breaches are something you never want to happen, but unfortunately, they’re becoming more common. While there’s no way to completely prevent these types of attacks, there are some things you can do to make yourself less vulnerable. The following tips…

Details

Why Cybersecurity for Insurance Companies Should be a Top Priority

We need to rethink cybersecurity Cybersecurity is more than just preventing data breaches. It’s about creating a culture of security, making sure your company is prepared for any kind of attack and taking steps to mitigate risk. As an insurance company, you have a unique perspective on cybersecurity. You’re in the business of protecting your…

Details

Cybersecurity: What is it and why do you need it?

RJ2 Perspective Written by: Jeff Dann, President of RJ2 Technologies Cybersecurity: What is it and why do you need it? Cybersecurity is a complex area of computer security that focuses on protecting systems, data and networks from attacks. A cyberattack is any attempt to gain access to a system or network with malicious intent. Cybersecurity…

Details

How to secure your passwords

How to secure your passwords Generate random passwords using a password manager To make the most of your password manager, you’ll want to use a strong and unique password for each account. That’s because if someone gets access to one of your accounts and can then log into another account (which often happens when people…

Details

The importance of developing a backup and disaster recovery plan

Introduction If you haven’t developed a data backup and disaster recovery plan, now is the time to do so. As we’ve seen in recent years, natural disasters like Hurricane Harvey, tornadoes in Oklahoma, earthquakes in Mexico City and more have left businesses without access to critical information. These events can be devastating—but they don’t have…

Details

What you need to know about endpoint protection.

Introduction Endpoint security is a topic that’s rapidly gaining in popularity. With the increasing number of cyberattacks, it’s now more important than ever to ensure that your company’s data is safe from hackers and malware. Let’s take a look at some of the most important things you need to know about endpoint protection: What is…

Details