How to Identify Spam and Safe from Spoofing, Phishing and Pharming

spot and stop spam.png

In the early days of the internet, the dangers of spam were easy to avoid by following a few simple rules. You could dodge most security risks and identity theft by deleting unsolicited attachments and offers from “Nigerian princes.” Then, spam-recognition algorithms became advanced enough to rid us of most of the chaff in our…

Read More

IT Security Best Practices: Saving, Sending & Sharing Files

security week1.png

Information technology has become a vital part of everyday life and business.  The barrier to entry is lower than it’s ever been and there are numerous free technology solutions available for saving files, sharing files, and sending files. Many offer flexibility and accessibility, but it’s also critical to ensure your files are secure.  Here we…

Read More

SMBs: Reduce your risk by implementing a security solution

  According to a recent Symantec report “2015 Internet Security Threat Report”, 60% of all targeted attacks impacted small and medium-sized businesses (SMB), many of which were not prepared and lacked security practices. At CRA, we are seeing more and more attacks targeting SMBs at a rapid rate. It is vital that SMBs have a…

Read More