Blog

Ransomware

Ransomware

The war against malware is a never-ending battle. One of the most vicious types of malware is often referred to as “Ransomware”. Ransomware encrypts your files and/or hard drive and completely disables your ability to access your files unless you pay the ransom to unencrypt your data.

WiFi Security

WiFi Security

As you are aware, we are all at risk for our business and personal networks and accounts being hacked, whether it be passwords, credit card info, or information that would help identity thieves. Over the next number of months and years Imagine IT will make recommendations to continually harden network and data security for our Partners.

Social Engineering Attacks

Social Engineering Attacks

As you are aware, scammers use many methods to try to obtain your confidential personal and business information. Since firewalls, antivirus software, and passwords are better than ever at protecting your data, the scammers are now using “social engineering” as a way to get around your core security technologies.

Portable Device Security

Portable Device Security

As you are aware, we are all at risk for our business and personal networks and accounts being hacked, whether it be passwords, credit card info, or information that would help identity thieves. Over the next number of months and years Imagine IT will make recommendations to continually harden network and data security for our Partners.

How to start using OneNote

OneNote is slowly gaining popularity.

But I noticed a problem.People like it – they want to use it – but the EXACT steps of starting to use OneNote are not clear. So here are the OneNote Start Guidelines. Click here to read more

Image source: OneNoteSource: Efficiency 365

Password Management Systems

Password Management Systems

As you are aware, we are all at risk for our business and personal networks and accounts being hacked, whether it be passwords, credit card info, or information that would help identity thieves. Over the next number of months and years Imagine IT will make recommendations to continually harden network and data security for our Partners.

Two-Step Authentication

Two-Step Authentication

As you are aware, we are all at risk for our business and personal accounts being hacked, whether it be passwords, credit card info, or information that would help identity thieves.

Part of the Solution:

Two-Step Authentication (sometimes called “two-factor” or “multi-factor”). Two-step makes it exponentially more difficult for a hacker to gain access to your accounts.