What You Need In An Email Security Service

Written by: Mike Mannarino Technology Business Consultant NET Xperts LLC In the fast-paced world we live in, your email security needs to go beyond traditional email filtering. I am often asked if I only did one thing for protecting our systems, what would it be? I always reply ā€œend–user training.ā€   Your most valuable and most vulnerable asset is your employees. Performing phishing simulations and awareness training can give your employees a peek […]

How To Protect Your Privacy Online

Written by: Patrick Weber Technology Business Engineer NET Xperts LLC Protecting your personal privacy online can be just as important as protecting your data and passwords.  Even seemingly useless information on its own can be collected and aggregated, used to build a profile about you, and then used to gain more sensitive information.    Protecting yourself can be as simple as […]

Spotting and Avoiding Tech Support Scams

Written by: Matt Sabo Technology Business Consultant NET Xperts LLC Youā€™re waiting in line, your morning is rushed and you get an urgent email from your direct report requesting invoice credentials for one of your main clients. Itā€™s a Wednesday. Usually these requests wait until Friday but without questioning it you send the information to satisfy your manager.  In that […]

Best Practices for Using Public Wi-Fi

Written by: Mike Green Director of Sales NET Xperts LLC According to the U.S. State Department, it is reported that 71% of consumers consider a strong Wi-Fi signal a deciding factor when traveling rather than security considerations. With public Wi-Fi use being an inevitable reality it is important for users to maximize their personal security. The following are some best […]

Cybersecurity Myths

Written by: Jim Wagner Technology Business Consultant NET Xperts LLC One of the biggest Cybersecurity myths is that breaches are caused by external actors. According to the Verizon 2020 Data Breach Investigations Report, 30% of all cybersecurity ā€œincidentsā€ are perpetrated by insiders. Not all of these attacks are malicious as some cases are just human error. It is so important […]