by cchambers@mankatotechs.com | Sep 16, 2022 | Insights
Does your business have a policy for handling employee terminations? Does that policy include IT related considerations? IT concerns should be a central component of any employee termination policy. Employees with access to email and other data could potentially do...
by cchambers@mankatotechs.com | Jul 7, 2022 | Insights
Browser extensions are useful tools that can add functionality to your internet experience, but they are also being used more frequently as security loopholes, attack vectors for malware, or ways to show users more advertisements. So, what exactly are browser...
by cchambers@mankatotechs.com | May 20, 2022 | Insights
The rise of phone and email scams has changed the computer threat landscapes, but computers still get traditional malware and adware which can present a security risk as well as being incredibly annoying. Here are some signs that your machine might be infected with...
by cchambers@mankatotechs.com | Mar 24, 2022 | Insights
Hackers know that the easiest attack vector for compromising networks is the people who interact with them. Phishing is a favorite method of hackers who use social engineering to turn your employees into security exploits. It’s often as simple as sending an emailed...
by cchambers@mankatotechs.com | Mar 2, 2022 | Insights
It sometimes seems like everything we do is documented online. All over the world, people are sharing their likes and dislikes, their dietary choices and their travel plans with friends and total strangers alike. To what extent is the information we are sharing...