Information Technology Professionals - IT Pros USA


Category: IT Security

October is National Cybersecurity Awareness Month

Celebrating its 15th year (just like our company) the National Cybersecurity Awareness Month (NCSAM) was established to raise awareness about the importance of cybersecurity, both personally and professionally. Each year, NCSAM is a shared cause between the technology industry (that’s us!) and the government to help ensure all Americans have the necessary protections to feel […]

Read More »

Five Tips to Protect Yourself on Public WiFi

It’s “Why-Fi,” not “We-Fee” … long are the days that people don’t know how to pronounce Wifi… but most consumers and businesses still aren’t knowledgeable when it comes to public wifi. Take this example – your team is out of town, preparing for the big presentation at a little coffee shop around the corner from […]

Read More »

What are the Eight Rights of Users Granted by GDPR Laws

Before you start reading, check out our free GDPR Webinar! If you missed our introduction to GDPR, you can catch up now or read it after learning about the eight rights of the user. At its core, GDPR seeks to provide consumers with better personal data security. This extends much farther than most people initially thought. Individuals […]

Read More »

GDPR Compliance – Coming to an International Business Near You

Before you start reading, check out our free GDPR Webinar! Has your inbox been flooded with emails from online retailers, service providers and all those newsletters you’ve subscribed to? Organizations all over the world are preparing for new personal privacy laws that went into effect last Friday. As a note, this is a European law, not […]

Read More »

Not your Father’s Phishing

As we approach Tax Day, it’s a great time to talk about personal information security, and specifically, how to avoid phishing scams. Scams Increase during Tax Season For those who don’t know, phishing is a form of fraud where the scammer attempts to gain access to your personal information by posing as a reputable source […]

Read More »

10 Steps for Effective Vulnerability Management

Data Security: Effective Prioritization & Management For every organization, information is a valuable asset, yet it is challenging to secure. As the value of information increases so too does its attractiveness to criminals and other attackers. However, unlike other valuable assets such as cash, information is not secured in a large safe which can be easily […]

Read More »

5 Technology Decisions to Make Now

One of the most crippling things a business can do is neglect to make decisions. Often businesses and departments wait too long and their hands are forced to make decision without thoughtful consideration or alignment to a long-term strategy. Strangely, this is what most SMBs choose to do when it comes to their technology decisions. The problem […]

Read More »

2 Reasons Apple Users Should be More Security Aware Immediately

I am an Apple and Windows user.  No way around it in my line of business I have to live on multiple platforms every day.  Spent a fair amount of time over the last 2 weeks using my old friend CentOS (Linux) even.  Often times people feel the warm flow of their Apple logo protects […]

Read More »

Apple vs FBI in 3 Bullet Points What You Should Know

There has been a lot of press lately about an ongoing argument between our government and one of the world’s largest technology companies, Apple.  I wanted to take a moment to distill this debate down and explain what some of the core issues are. Solid State Drive and Program encryption.  If you have a desktop […]

Read More »

Is Windows 10 Stealing All of Your Passwords and Personal Information?

As you know, Microsoft has released a new product – which means it’s also time for the internet world to bombard everyone with their opinions and judgments of the newest, hottest operating system Windows 10. One reaction which I appreciate is about security and privacy.  I spend my share of time alerting people to privacy […]

Read More »

Next Page »


Get Started