-
Phishing Techniques
Phishing is when you receive communications or visit websites that are intentionally deceptive in an effort to try and trick you into providing information ... -
Online Reputation Management Tools
These days what is said about you or your business online can have a huge impact on your business. It is in your best ... -
Manage Your Reputation (Google Alerts)
Google Alerts is a great free tool from Google that allows you to type in any word or phrase into the search bar and ... -
The Free Google Business Listing
The Google Business Directory is the map that shows up above the regular search results when you search on the Google Search engine. It ... -
Setting up 2-Step Verification
2-Step or 2-Factor Verification is a security measure that many websites, apps, and programs use these days, where they use a second unique identifying ... -
Public Wifi
While it can be convenient to pop into the local coffee shop and use their free wi-fi connection to get some work done online ... -
Online Safety Tips
The Internet can be a pretty dangerous place these days. In this video we will give you some tips and tricks to hopefully keep ... -
General Tech Safety Tips
There are many areas of your daily activities in your business that can get you in trouble with viruses, malware, and more. In this ... -
Online Reputation Management
The information about you online can seriously affect your chances of gaining business these days. A bad review here, an online disagreement over there, ... -
File Encryption
Encryption is simply password protecting documents or folders to ensure that their contents can not be opened and read without your knowledge or permission. ... -
GSuite – Add-Ons Overview
GSuite (formerly knows as Google Apps for Work) is an incredible cloud-based system that allows you to run just about every aspect of your ... -
General Tech Safety Tips
In other videos, we have focused on solutions to specific cyber threats such as weak anti-virus protection, passwords, patches, encryption, and more. In this ... -
Data Security Broker Risk Management
The Code of Ethics requires you to collect & store all documents, communications, etc. that pertain to your business for up to 5 years ...