Blog

Quick Video: 3 Ways to Detect Ransomware

One of the reasons companies may experience so much damage if their systems are compromised by ransomware is that the breach might not be discovered for some time.

If you have 1 minute 15 seconds extra in your day, watch this quick video on 3 ways that can help detect if your company has been hit with ransomware.

How Remote Work is Driving the Adoption of More Secure Authentication Methods

Not least of all the challenges of this past year has been cybersecurity and how companies have had to evolve with the circumstances. Traditionally, we've all relied on common modes of authentication like passwords and phrases, of varying degrees of hackability, but the good news from this past year - remote working is making more businesses use more secure authentication methods.

Tuesday Tip: Silencing Windows 10 Notifications with Focus Assist

Staying productive is challenging enough sometimes, whether you work remotely or are back in-office. While notifications are useful in some cases, sometimes you just want your computer to keep quiet. This is why Windows 10 includes the Focus assist feature, allowing you to block all or some notifications when you need to concentrate or share your screen with others.

Monday Warm Up: Malware or Rapper Name Quiz?

Let's get crackin' on this week with a little cybersecurity fun!  Do you know the difference between these rapper names and malware types (hint: grab your nearest middle-schooler for some help if needed)...?

Take the quiz and see how tech (and rap)  savvy you are.

Have you updated this iPhone Security Setting?

At Fulcrum Group, we feel it is important to regularly revisit security settings on all of your devices (not only work-related) as a general cybersecurity best practice. When your security is tight all over, you provide less opportunities all around for an inadvertent breach to occur.

Our Favorite Windows 10 Keyboard Shortcuts

Did you know that Windows 10 has MANY keyboard shortcuts?  Which ones do you use day to day?

Some of my favs I use daily include perhaps the most well-known:
Ctrl+X - Cut
Ctrl+C - Copy
Ctrl+Y - Paste

But also:
Ctrl+Z - Undo
Ctrl+Y - Redo
Ctrl+A - Select All

Alt+Tab - switch between open windows

F5 - Refresh the screen

and

the PrtScn button - take a screenshot of your whole screen and copy it to the clipboard

Go ahead and try some new ones from this article from Microsoft and you'll be commanding that keyboard like a tech-savvy teenager in no time!

FREE Cybersecurity Guide from The Fulcrum Group

Cyber-crime is costing the world economy $1 trillion per year. You need a plan to keep your business protected. Check out this FREE Cybersecurity Guide we've prepared to help get you started.

Feel free to share with a colleague.  As always, any questions - give us a shout.

5 Top Cybersecurity Threats: Attacks on Connected Medical Devices

Our last focus in this series, based on the recent campaign from HHS' 405(d) Task Group is Attacks on Connected Medical Devices. The information on these flyers we are sharing with you was pulled directly from the Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP) publication.

5 Top Cybersecurity Threats: Insider, Accidental or Intentional Data Loss

As we mentioned in our first blog post of this series, HHS' 405(d) Task Group, with which Fulcrum Group is associated, has detailed and created flyers for 5 Top Cybersecurity Threats and we're sharing them with you throughout this month, along with great tips on how to mitigate!  Although these particular tips and flyers are geared around a healthcare environment, the recommendations and security strategies mentioned fall under standard cybersecurity best practices for any organization.