Pink Hat Technology Management

Blog

National Cyber Security Awareness Month : Week 4 of 4 – Incident Response 101

Tip #1: “First 24 Hours” Checklist So, you clicked on something you shouldn’t have, and now you have a warning on your screen or a failed attempt to open a document attachment that leaves you wondering if that was not ...

National Cyber Security Awareness Month: Week 3 of 4 – Mobile Devices & Cybersecurity

Learn more on how to secure your company’s mobile devices. Tip #1 Have users password protect access to mobile devices Why: This will go a ...

National Cyber Security Awareness Month:
Week 2 of 4 - Emails & Cybersecurity

Tip #1 How to spot a phishing email? When internet fraudsters impersonate a business to trick you into giving out your personal information, it’s called phishing. Don't reply to email, text, or pop-up messages that ask for your personal or financial ...

National Cyber Security Awareness Month:
Week 1 of 4 - Employees & Cybersecurity

Your employees are your last line of defense. Learn what they can do to help protect company data. Tip #1 Train your employees in ...

Are your digital credentials for sale on the Dark Web?

By Joy Beland  We found it. An awesomely powerful Dark Web filtering service that allows us to see if any credentials from any websites have ...

BACK AGAIN! October is National Cyber Security Awareness Month!

National Cyber Security Awareness Month (NCSAM) is a collaborative effort between government, industry and organizations of all sizes to help you and ...

How employees can secure their mobile devices

Set a PIN or passcode: This is the first line of defense—if someone wants to access the device, they first need to break the ...

The “Scam Compensation” EMAIL SCAM

By Valerie Quevedo  What’s worse than cyber crime?  Cyber criminals posing as cyber-crime fighters!  I received the email below in my inbox this morning, ...

Joy’s cyber security presentation for NAWBO LA

By Karina Weiler Last week I came to the office only to find this cute paper doll chain made by Valerie ...

Putting together a comprehensive security review

By Joy Beland More and more businesses are approaching us for information on a security review – and many of them have been hit ...

Contact

Pink Hat Technology Management

Newsletter

  • This field is for validation purposes and should be left unchanged.

Social Media

  • Facebook
  • Twitter
  • LinkedIn