2-factor authentication

Creating a Layered Security Approach

"Imagine a typical Seattle weather day (excluding July and August maybe). You’re heading out for a mixed day of fun and errands that may include visiting the local farmers market, taking the dog for a walk, making a trip to a taco truck, and maybe a hike around Discovery Park. You’ll do some walking, some driving and move between indoors and outdoors. How do you dress for this multi-faceted excursion? Layers. The answer is always layers."

Read More

Free Webinar: Right Sized IT Security & Compliance

EXP will host a free webinar on Thursday November 8th. FREE ONE HOUR SECURITY CONSULTATION FOR ALL ATTENDEES! FREE DRAWING FOR AN AMAZON ECHO! Security The most vital aspects or your overall IT Security Plan, including how to effectively AND efficiently secure your cloud. Compliance Learn from the EXPerts on how to stay compliant in […]

Read More

Think Before You Click: Employees Need to be at the Frontline in the Battle Against Phishing

At EXP, we strongly believe in the web of protection that must exist to properly guard institutions and their data from these threats. This web is comprised of several things. Many of these are technological tools that keep threats from ever entering your environment, let alone being executed within it. Unfortunately, all the gates, checkpoints and filters cannot prevent human error\action – frequently the last stop on the cyberthreat train. Humans must be informed users of technology for our web of protection to remain whole.

Read More

Stay Alert & Foil Phishing Attempts

We regularly see cases of successful phishing attacks. Most of them involve people being conned into sharing valuable personal information with unauthorized parties. This is usually done over email but sometimes involves a phone call.

A frequent scam goes like this. You receive an email from someone claiming to work at an organization you trust or regularly interact with such as your bank or a retailer you often shop with. They seem legitimate because they have likely gathered some accurate information about you from social media, your company website, press releases, or other public means. Since they get a few details right, you may be inclined to believe them. But you must dig deeper to determine if the request is legitimate.

You may be asked for personal information that could be used to access funds — credit card numbers, bank account information, passwords, etc. — or even asked to wire money. All this is done, of course, under false pretenses. And it could cost your business a heap of money and hassle.

Read More