Categories
Cyber Security Hackers

What do hackers look like? (Part 1)

Hint: Probably not what you envisioned. When you hear the word “hacker,” what image comes to mind?  For many, it’s a creepy, sweaty, hooded fellow in a basement, with green streams of binary code flowing through their monitors.  But here’s the truth: those days are largely gone.  Instead, hackers have central offices, intense security, and…

Read More
Categories
Cyber Security Tech Advice

What Is Endpoint Detection and Response (EDR)?

What it is, who needs it, and how to get it We know: there are a lot of acronyms to juggle these days, especially in the tech world.  But EDR is one you’re going to find really useful—and fortunately, it’s pretty straightforward. EDR stands for Endpoint Detection and Response.  We hear you asking, “What’s an…

Read More
Categories
Cyber Security Tech Advice

10 ways to improve your cybersecurity in 10 days

There’s no doubt cybersecurity is a key priority for your business and personal IT safety. But let’s face it: sometimes implementing these protocols can feel overwhelming. Fortunately, Stratti’s got your back. As your trusty IT wingman, we’ve identified 10 quick and easy steps you can take today to improve your cybersecurity posture. Do one a…

Read More
Categories
Cyber Security FTC Requirements

What Every CPA Needs to Know About the Safeguards Rule

What’s changing in cybersecurity regulations for accountants, and how Stratti can help  The Federal Trade Commission (FTC) recently made updates to its Safeguards Rule. Regulations have been adjusted to ensure non-banking institutions, like auto dealerships, law firms, and accounting firms like yours, will be responsible for digital security systems that protect client information.  With the…

Read More
Categories
Cyber Security Terms

Hook, Line, and Scammer: What Is Phishing—and How to Spot It

Imagine a calm, breezy riverbank, with a cooler full of bait and cold drinks. That’s fishing at its finest.  Phishing with a ph, on the other hand, is a term used to refer to the tricks cybercriminals use in messages, emails, and other communications to get people to reveal personal information.  It’s an extremely common…

Read More
Categories
Cyber Security

Have You Booked Your Free 15-Minute Cybersecurity Assessment?

How strong is your cybersecurity?  It’s hard to know if what you’re doing is enough to keep your business safe.  With new threats and new technology around every corner, it can feel impossible to keep up with all the opportunities to strengthen your company’s cybersecurity, much less prioritize the tools that fit best.  But good…

Read More
Categories
Cyber Security

The Evolution of Cybersecurity: 30 Years of Protecting Businesses

As humanity evolves, technology changes right along with it. For 30 years, Stratti has been at the forefront of emerging IT and cybersecurity, ensuring your business is in line with current security protocols and equipped to perform in an increasingly digital world.  Let’s take a look back over the last 30 years of cybersecurity to…

Read More
Categories
Cyber Security Managed Cookies

What Are “Managed Cookies”?

Have you ever visited a website, only to be hit by a notification bar asking you to “Accept Cookies?”  Chances are, you’ve clicked whatever choice felt best at the time—probably, whatever option allowed you to get the pop-up out of your way! But…what are managed cookies?  In essence, cookies are small files that help websites…

Read More
Categories
Cyber Insurance Cyber Security

What is PCI Compliance?

Calling all Administrators, Business Owners, and Decision Makers – Let’s Talk PCI Compliance!  What is PCI Compliance?  PCI compliance has been around for a while, but you might have heard about it more recently in relation to the rising rates of cybercrime. PCI refers to the adherence to the Payment Card Industry Data Security Standard…

Read More
Categories
Cyber Security Tech Advice

How to Create a Strong Password

Spoiler alert: you’re not as safe as you think you are! Here are how some tips on how to make your password usage safer.  Practically everyone has a smartphone, some kind of computer, and often a tablet tossed in the mix, too—and whether we’re using our devices for work, school, or fun, we’re using passwords…

Read More

Protect your business from cyber attacks in 5 minutes a week

Sign up for our weekly tech tip emails, sent directly to your inbox.