Author: Jenni

Jan 07, 2019

We Can Handle Phishing. Can You?

Due to an increase in phishing attempts, you may have recently been contacted by your credit card company, bank, or credit union warning you not to click on links in emails that appear to be from them.  Phishing (fake email) messages can be made to look very real.  Unfortunately, following the instructions in these messages […]

Read
Dec 21, 2018

2018 – What a year it’s been!

“It came without ribbons! It came without tags! It came without packages boxes or bags! And he puzzled and puzzled till his puzzler was sore. Then the Grinch thought of something he hadn’t before! What if Christmas, he thought, doesn’t come from a store. What if Christmas…perhaps…means a little bit more!”  – Dr. Seuss, How the […]

Read
Dec 10, 2018

4 Ways an IT Managed Service Provider Reduces Stress and Increases Productivity

Imagine a life where you don’t lose sleep over IT problems at the office.  You work on strategic goals without the interruption of multiple IT support requests or an issue with your network.  You spend more time with your family and friends, doing the things you love. That world doesn’t have to exist only in […]

Read
dashboard data reporting
Nov 13, 2018

How to Choose a Data Reporting Solution

Everyone can appreciate a report that is clear, concise, and comprehensive.  Finding a data reporting platform that can generate that report and meet all of the organization’s criteria can be a challenge. Decide on “Wants” for your Data Reporting Solution Once the need for a new data reporting solution was established, two of our experts, […]

Read
Oct 16, 2018

“Apple Care” Vishing Attacks

One of our partners, KnowBe4, recently warned of vishing attacks (like phishing, but by phone).  Each of us needs to be protective of our personal information.  In this case, if you use Apple products, please be especially vigilant, as a new scam is underway. As shared with Safety Net by KnowBe4: KnowBe4 Scam of the Week: […]

Read
Cyber Security Awareness Month
Oct 11, 2018

Latest Hacker Scam – Posing to be Your Vendors

Hackers have found a new target – trusted relationships between your organization and your outside vendors.  Homeland Security issued an urgent appeal to businesses across the country to be more vigilant about access to sensitive information. Please share this blog with all your coworkers who may answer a call or email, so they’re prepared to […]

Read
Sep 27, 2018

Safety Net Introduces Text for Support

There are times when reaching out for IT support via traditional methods can be a challenge.  At Safety Net, we always look for innovative ways to serve our clients.  Text for Support seemed like a logical step after launching Live Chat a while back.  The two tools offer a lot of the same functionality and efficiencies, […]

Read
Sep 21, 2018

Cyber Security: How to Protect Your Business

In the first half of 2018, over 760 million data records have been breached in cyber-attacks in the U.S. alone.  High profile attacks, such as the Facebook breach, have shown that even the largest organizations face significant cyber security challenges. DATA PROTECTION Data loss has a significant impact on your business, in the short and […]

Read
standardize
Sep 14, 2018

Does Your Business Need Standardized Email Signatures?

Standardized email signatures are valuable.  They convey more about your company than you may realize.  We’ve all heard the saying, “Consistency is key.”  Email signatures aren’t any different.  Having your communication ducks in a row can set you apart from the competition. What Standardized Email Signatures Do Indicate you value professionalism, which is sometimes lost […]

Read
Sep 06, 2018

Quick Email Spam Test | How to Approach a Suspicious Email

Phishing attacks are one of the most frequent ways malicious hackers gain access to confidential information and subsequently, entire business networks.  It’s far easier to trick you into sharing your credentials than it is to hack through servers and firewalls.  In the past, emails with infected attachments were a large problem.  Now, the most common […]

Read