Cyber Security

If You Connect, You Must Protect

Be it for our personal use or for business purposes, most of us are connecting to networks and interacting with some form of sensitive data on a daily basis. We…

Read Now

Stranger Danger: How to Spot and Avoid Phishing Attempts

Stranger Danger: How to Spot and Avoid Phishing Attempts

Phishing is a form of social engineering that attempts to steal sensitive information such as passwords, bank account details, or credit card numbers. Phishing attempts can be targeted attacks, which…

Read Now

Secure IT: Shop Safe Online

Everything we do on a daily basis has some form of “trust” baked into it. Where you live, what kind of car you drive, where you send your children to…

Read Now

Enable Multifactor Authentication For Added Security

What Is Multifactor Authentication (MFA)? Authentication usually requires a username and password. This is considered single factor authentication. MFA adds another step in the authentication process by requiring a second…

Read Now

Best Practices for Keeping Tabs on Your Apps

Let’s start this conversation out with the definition of device. The list of what constitutes one is growing. For now, let’s say that you have a home computer (desktop, laptop,…

Read Now

© PC CONNECTION, INC. ALL RIGHTS RESERVED.