With the 2020 U.S. Election under a month away, there has been a lot of concern that outside interests would try to influence the results. Microsoft...
Reciprocal Technologies Blog Security • Page 25
Harden Your Security with a 2FA Authentication App
Weak passwords are a huge problem, one that almost everyone is guilty of. Even if you think of yourself as being a diligent, security-minded person,...
Tip of the Week: 5 Warning Signs of a Phishing Attack
Phishing attacks are a very common threat nowadays. Between the classic message from a supposed Nigerian Prince to a sudden and urgent email from...
Tip of the Week: Simple Steps to Safer Email Practices
Security is always a business priority, and with so many business needs now fulfilled digitally, it is critical that cybersecurity has a strong...
Improving Organizational Cybersecurity
The nature of many of today’s businesses is building one product over and over and over. When you have that level of repetitiveness, it helps people...
Blockchain Is Changing the World, One Node at a Time
Blockchain was all the rage for five years. You couldn’t talk about technology without someone bringing it up. At that point, it was listed as the...
Is Blockchain Still a Big Deal? (It Sure Is)
It seemed that, not so long ago, everything was going to be associated in some way to blockchain and blockchain technology. All online transactions...
Employees Can Be Your Business’ Best Defense Policy
A business’ employees are perhaps its greatest weakness in terms of its cybersecurity, although they also have the potential to be one of its...
Many Businesses are Still Using Windows 7…
So many organizations continue to use a decade-old operating system, and they really, really shouldn’t.Here’s the thing: Windows 7 is dead and gone…...
Is My Smartphone Tracking COVID-19 Exposures Without My Consent?
Remember a few months ago when Google and Apple joined forces to come up with a system to help state and local governments establish a COVID-19...