James Phipps Zero Trust security model simplified ** ** You know that implementing a Zero Trust security model is important, but it's hard to get your head around how to do it. Implementation can seem like a daunting task, but it doesn't have to be.... May 10, 2022
James Phipps Signs Your Computer Might Be Compromised: What to Look For Your computer is the lifeline of your business. It's how you stay connected with clients, access important files, and keep your day-to-day operations running smoothly. So if you think your computer mi... May 6, 2022
James Phipps Chinese threat actor using stealth malware Microsoft is once again sounding the alarm about the latest malware campaigns and cyber threats. This time, the alert is for Tarrask, a "defense evasion malware" that uses Windows Task Scheduler to hi... Apr 14, 2022
James Phipps Don't be the next victim of SIM swapping SIM swapping is a new kind of identity theft that can happen to you if your cell phone is your go-to device for checking your email, paying your bills, or posting to social media. Here’s how hackers c... Apr 6, 2022
James Phipps You should be thinking about your company's digital security. The US government's assessment of the risk of cyber attacks by Russian hackers is getting worse as more attackers are detected daily and as they become more sophisticated. The US is now warning Americ... Mar 25, 2022
James Phipps Russia's Cyberwarfare Tactics Could Impact Your Business With the news of Russia's alleged cyberwarfare tactics coming to light, business owners are likely wondering how they could be impacted. BeCloudIT is here to help you protect yourself and your busines... Feb 16, 2022
James Phipps 5 easy steps to protect yourself from unsolicited email hacks. Recently, at BeCloud, we have noticed an uptick in spam and phishing emails. According to the Cybersecurity Firm Proofpoint, 57% of organizations experienced a successful phishing attack in 2020. An... Jan 18, 2022
James Phipps Email Security How does BeCloud protect email mailboxes?** No solution is 100% effective because attackers are always changing their techniques, but Becloud puts some key components in place to protect our SecureIT ... Nov 17, 2021
James Phipps Five Steps to Zero Trust? Zero trust is a modern security architecture that divides networks up into segments while also enabling granular user controls. Simply put it means "never trust, always verify". Below are steps that ... Nov 1, 2021
James Phipps Top Security tools for AWS According to isdecsions.com [1] 49% of United States Small and medium sized business think their data is unsafe in the cloud. Actually, data stored in the cloud can be safer than data storage on-pre... Nov 1, 2021
James Phipps What is BeCloud's SecureIT Managed Service? BeCloud has been protecting our customers networks since 2011. During this time we have gained significant experience on what works best to defend our clients. When clients follow our advice they ha... Nov 1, 2021
James Phipps What is layered security? Sometimes when I talk to customers about improving network security they are quick to proclaim I have antivirus installed on my computers, thank you. But putting your faith totally in antivirus is da... Nov 1, 2021