According to a 2019 report by The Radicati Group, there are more than 3.9 billion email users worldwide. With this number only expected to grow, it is no surprise that scammers rely heavily on email to virtually attack businesses. One of the most common types of email-based attacks is phishing.
Does your WIFI randomly drop out?
Have you ever been working and all of a sudden your WIFI signal drops? Maybe it doesn’t completely go away, but slows down tremendously. What is causing this? Is your internet service provider (ISP) having issues? Before you call your ISP, let’s take a look at some other common causes. Interference What is interference? Our friends over at Hospitality Wifi … Read More
Should you rent or own your WIFI router?
Have you ever considered whether you should rent a router or purchase your own? What’s the big difference? Let’s take a look at owning your own versus renting one from your Internet Service Provider (ISP). Are you technically savvy? If you aren’t familiar with setting up a WIFI router, you want to take this into consideration. If you don’t feel … Read More
Where should you point your WIFI antenna?
With the recent quarantine and stay at home order, your home wifi connection is very important, especially if your work depends on it. It’s not the time for something to go wrong with it. If you’re getting a weak signal, it could be that an external antenna on your router isn’t pointed in the right direction. While that could seem … Read More
Who Is CCI? | What makes us stand out?
You might wonder who we are, and what makes us stand out. CCI stands for Communication Concepts, Inc. We are a team who provide IT and cybersecurity solutions to businesses. We’re more commonly known as an IT or Managed Service Provider. If you want to learn more about our team and our founding, check out our About Us page. How … Read More
Risk – Part 5: What is a patch…and do I really need to install it?
You have probably seen or heard of software patches or updates. Pretty much every company in some way releases patches. In simple terms, Wikipedia does a great job defining it: a “set of changes to a computer program or its supporting data designed to update, fix, or improve it.” But how does this affect the here and now? If you … Read More
Risk – Part 4: Do I really need to enable 2FA or MFA?
You likely have heard the terms 2FA or MFA. Both are thrown around and you’ve probably seen them as an option you can enable in different accounts online. But how do they directly affect you and does it really make a difference? Well, let’s give a scenario and then look into the specifics of MFA. Meet Greg. He is a … Read More
Risk – Part 3: Default Credentials
Today, we’re going to look at a very easy method that businesses and organizations can use to lessen the amount of risk of a cyber attack or a virus “infection.” You may be thinking, “What is it?” Well, one area that is commonly overlooked is ‘default credentials’ for new devices. Default credentials are the administrative logins and passwords that come … Read More
Risk – Part 2: Should I make everyone an administrator?
As we previously discussed in a blog post, “We face risk every day. Some risks we can avoid and others we can’t,” but today, we’re going to talk about one area where you have a little more control and the ability to lessen the overall risk. Let’s start off asking a question… Who has domain administrator access on your business … Read More
You are facing risk! | Cybersecurity and Viruses
RISK: “expose (someone or something valued) to danger, harm, or loss.” (dictionary.com) We face risk every day. Some risks we can avoid and others we can’t. When we drive a car, we risk a possible accident or maybe getting stranded if the car breaks down. Risk is a fact of life. As many know, a fountain pen is more prone to leak versus … Read More