Security - SRS Networks Blog | Salinas, CA | SRS

Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

SRS Networks Blog

SRS Networks has been serving the California area since 1976, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Make IT Security a Priority for Your Business

Make IT Security a Priority for Your Business

With so many people working from home due to stay-at-home orders resulting from the COVID-19 pandemic, IT security may not be at the forefront of users’ minds. Unfortunately, scammers and hackers aren’t unemployed during this time and are still causing havoc for businesses of all sizes. Let’s take a look at cybersecurity during COVID-19.

0 Comments
Continue reading

Video Conferencing Security is Important

Video Conferencing Security is Important

Video conferencing has been one of the surprise winners of the COVID-19 era. As large percentages of people are asked to distance from others, one solution that has been extremely popular is to have meetings over the Internet. While seemingly the whole world is using video conferencing solutions, for the business, there are other considerations that have to be made. Today, we’ll hit on some strategies you can use to improve the security of your web conferences. 

0 Comments
Continue reading

Basic Wireless Security for Remote Work

Basic Wireless Security for Remote Work

With remote work becoming a popular option amongst businesses nowadays, concerns and considerations should be raised about how secure the networks being used are: namely, the Wi-Fi connections many have in their homes. Just as in the office, it is important that these networks are properly secured for the good of your business.

0 Comments
Continue reading

Is Security in Telework a Myth?

Is Security in Telework a Myth?

With so many people working from home due to the COVID-19 outbreak, organizational IT security is stretched thin. It is important that you know how to maintain operational integrity while prioritizing security when your whole staff is working from home. 

0 Comments
Continue reading

Managing Your Business and Remote Workforce During the COVID-19 Pandemic

Managing Your Business and Remote Workforce During the COVID-19 Pandemic

Companies around the world have or are finding the need to send their workers home to prevent the spread of the novel coronavirus. For many business owners, managing your staff remotely is a brand new paradigm. Here’s what you need to know.

0 Comments
Continue reading

Don’t Let Your Network Be Infected Thanks to Coronavirus

Don’t Let Your Network Be Infected Thanks to Coronavirus

Ever since it first popped up in the Wuhan Province of China, COVID-19 (better known as the coronavirus) has created quite a stir—bordering on panic—around the world. Unfortunately, as has been the case many times before, cybercriminals have been using this near panic to support their attacks. Let’s review some of the ways they do so, and how you can protect yourself and your business from these efforts.

0 Comments
Continue reading

What You Need to Do with IT and OT Interconnecting

What You Need to Do with IT and OT Interconnecting

The past two decades have generally seen business technology in one of two camps: either IT (information technology), which includes all of a business’ computers, peripherals, and networking equipment, or OT (operational technology), which included everything else. As time has passed, both have advanced, and now both carry the risks once limited to IT. Let’s examine how you can better secure your business by focusing on the convergence of IT and OT.

0 Comments
Continue reading

The ABC(DE)s of Mobile Security

The ABC(DE)s of Mobile Security

As of September of 2019, research conducted by Verizon states that almost half of enterprises--half--are willing to sacrifice their mobile security in order to gain “advantages” in speed and productivity. This marks an increase from just 2018, when this metric measured at a still-too-high one-third of enterprises. Of course, such behaviors could bring severe consequences. 

0 Comments
Continue reading

Tip of the Week: 4 Components to Keeping Data Safe

Tip of the Week: 4 Components to Keeping Data Safe

Your business is bound to collect a sizable cache of data, a significant percentage of which being the kind used to identify someone. This is exactly the kind of data that cybercriminals are looking for, which means it needs to be protected. Here, we’re covering the basics of how you can help secure your data’s integrity against cybercrime.

0 Comments
Continue reading

3 Reasons to Use a Password Manager

3 Reasons to Use a Password Manager

With all of the accounts that people have these days, it almost--almost--makes sense that people tend to use passwords that are too short, overly simple, and repeat across multiple accounts. Unfortunately, the only thing this does is to make accounts less secure. As a result, more and more authentication requirements are being put into place to keep security a priority.

0 Comments
Continue reading

Your End Users Are Your Last Line of Defense against Cybercriminals

Your End Users Are Your Last Line of Defense against Cybercriminals

Cybercrime has been on the rise over the last few years, and it doesn’t look like it will be slowing down anytime soon. As it turns out, bad actors can turn a profit by targeting businesses, and their tools and tactics are only getting trickier.

0 Comments
Continue reading

Windows 7 End of Life Upon Us

Windows 7 End of Life Upon Us

With just days before Microsoft retires two of its most popular operating systems, the quarter of computer users worldwide are at the risk of losing support on January 14, 2020. Therefore, we wanted to take this opportunity to explore the ramifications of an end of support event, and what you can do in response.

0 Comments
Continue reading

Do Browser Apps Put You at Risk?

Do Browser Apps Put You at Risk?

For the average PC user, the Internet browser is probably the most utilized piece of software other than your OS. Depending on which browser you use, you may decide to download additional software to give you features that you typically don’t have or give you functionality that is all new. Before you use these software add-ons, you should know that there have been several examples of this software working against users. Let’s take a look at how browser extensions work and how you can get better functionality without putting your data at risk. 

0 Comments
Continue reading

Working Remotely, You Need a Virtual Private Network

Working Remotely, You Need a Virtual Private Network

To those who weren’t around BEFORE the Internet became an irreplaceable business tool, it’s almost hard to imagine how businesses operated when this tool didn’t exist. Storing sensitive data has never been such an easy thing to do but at what cost? It is undeniable that the Internet has opened doors for not only us, but criminals as well. Today we discuss how these doors can easily be secured with the implementation of a virtual private network, or VPN.

0 Comments
Continue reading

Protect Your Privacy on Facebook, Part 2

Protect Your Privacy on Facebook, Part 2

If you haven’t read part one of our Facebook privacy blog, it wouldn’t hurt for you to go back and read that one first. Today, we will be looking at configuring your Facebook with security settings designed to protect your personal information. The social media giant certainly has a checkered history when it comes to protecting user privacy. In fact, a lot of its ongoing troubles center around maintaining individual privacy of its users.

0 Comments
Continue reading

Protect Your Privacy on Facebook

Protect Your Privacy on Facebook

Facebook is one of the most popular websites on the Internet and has been a global phenomenon for the two billion people that use the platform. This doesn’t mean that it has been smooth sailing for the tech giant, as over the past several years there have been a few major controversies concerning the privacy of user data and how Facebook works to secure it. Today, we’ll tell you how to get access to all the information Facebook has about you.

0 Comments
Continue reading

Tip of the Week: Improve Your Mobile Data Management

Tip of the Week: Improve Your Mobile Data Management

Data accessibility has never been easier for both you and your workforce, but how do you know if this convenience isn’t also benefitting cybercriminals? Your mobile device contains a vast amount of sensitive information and files which need to be kept secure. This presents the need for some sort of secure management system, which in the tech world is referred to as Mobile Information Management, or MIM.

0 Comments
Continue reading

Updating the Latest Major Data Breaches

Updating the Latest Major Data Breaches

A lot has been made recently about cybersecurity, and for many people it has caused them to alter the way they go about doing things. With more people more cognizant of their individual data privacy, and how to combat phishing and other social engineering attempts, you’d think major data breaches would be snuffed out regularly. It only takes one person, however, to fail to be vigilant for it to negatively affect a whole organization.

0 Comments
Continue reading

Fighting Fire with Fire: Automating Cybersecurity

Fighting Fire with Fire: Automating Cybersecurity

When it comes to cybersecurity, automation can benefit many of your processes and protections. Let’s review how automation can be used to protect your business, and by extension, your livelihood.

0 Comments
Continue reading

Understanding the Motives of Hackers

Understanding the Motives of Hackers

The term “hacker” has firmly become a part of the public lexicon, thanks largely in part to pop culture and its liberal use of the term. However, the use of the term so frequently has effectively diluted its meaning to “someone good with computers.” In order to keep your business secure against the hackers of the real world, it may help to understand the motivations behind their activities.

0 Comments
Continue reading

Latest Blog

With so many people working from home due to stay-at-home orders resulting from the COVID-19 pandemic, IT security may not be at the forefront of users’ minds. Unfortunately, scammers and hackers aren’t unemployed during this time and are s...

Contact Us

Learn more about what SRS Networks
can do for your business.

(831) 758-3636

SRS Networks
845 West Market Street, Bldg P
Salinas, California 93901

Account Login