Security
How to Identify Spam and Safe from Spoofing, Phishing and Pharming
In the early days of the internet, the dangers of spam were easy to avoid by following a few simple rules. You could dodge most security risks and identity theft by deleting unsolicited attachments and offers from “Nigerian princes.” Then, spam-recognition algorithms became advanced enough to rid us of most of the chaff in our…
Read MoreIT Security Best Practices: Saving, Sending & Sharing Files
Information technology has become a vital part of everyday life and business. The barrier to entry is lower than it’s ever been and there are numerous free technology solutions available for saving files, sharing files, and sending files. Many offer flexibility and accessibility, but it’s also critical to ensure your files are secure. Here we…
Read MoreSMBs: Reduce your risk by implementing a security solution
According to a recent Symantec report “2015 Internet Security Threat Report”, 60% of all targeted attacks impacted small and medium-sized businesses (SMB), many of which were not prepared and lacked security practices. At CRA, we are seeing more and more attacks targeting SMBs at a rapid rate. It is vital that SMBs have a…
Read More