Are You Having A Technology Emergency?

Stradiant Blog

Stradiant has been serving the Austin area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Train Your Staff to Protect Your Business

Train Your Staff to Protect Your Business

In the course of doing business, sometimes the mundane and repetitive tasks, or the responsibilities that employees don’t necessarily always consider to be part of their jobs, can be overlooked. Like any other business, yours needs people to be vigilant to ensure that it isn’t the victim of a phishing attack. If your team isn’t well-trained, or if it isn’t engaged in the fight against cybercrime, you may find that your business is a sitting duck.

0 Comments
Continue reading

Should You Be Holding Your Staff Accountable for Failed Phishing Tests?

Should You Be Holding Your Staff Accountable for Failed Phishing Tests?

It can be a real head-scratcher when one of your otherwise well-performing employees routinely falls for the simulated phishing attacks that you roll out as a part of your cybersecurity awareness strategy. For all intents and purposes, the person is a great employee, but when it comes to acting with caution, they fail. If you’ve made a point to prioritize your staff’s working knowledge of phishing attacks, do you replace this employee? We’ll take a look at it today.

0 Comments
Continue reading

How to Properly Train Your Staff to Avoid Phishing Attacks

How to Properly Train Your Staff to Avoid Phishing Attacks

In the late 1970s and early 1980s, Bell telephone companies were making a mint off of offering the ability to call your friends and family that lived outside your predefined region, charging up to $2 per minute (during peak hours) for long distance calls. The problem for many people was that these regions kept shrinking. Some people decided to combat this costly system by reverse engineering the system of tones used to route long-distance calls, thus routing their own calls without the massive per-minute charges demanded by long-distance providers. These people were called Phreakers, and they were, in effect, the first hackers.

0 Comments
Continue reading
TOP