Profile cover photo
Profile photo
OXEN Technology
13 followers -
Your Strong IT Partner for Over 30 Years
Your Strong IT Partner for Over 30 Years

13 followers
About
Posts

Post is pinned.Post has attachment
Defend yourself against ransomware: Email Attachment Filtering. Be #oxenstrong
Add a comment...

When your policies and processes support a culture of security, your risks are reduced and your staff knows what is expected and what they should do (or not do).

These types of security policies are for such things as
✔️acceptable use of equipment and accounts
✔️security incident response
✔️access control
✔️equipment disposal
✔️personal device usage
✔️termination policy
✔️BYOD policy
Add a comment...

Post has attachment
WHY POLICY?
Lack of security policies can let you down at a critical moment. What will you do if you have no acceptable use policy for company PCs and equipment, and an employee does something they shouldn’t?

We are here to help before that happens! Contact us to get started!
Photo
Add a comment...

Post has attachment
Newest #OXENblog is up! Are you ready to start tracking changes to document content in @Microsoft Word?
Add a comment...

Post has attachment
Think your password is secure enough? You may want to think again. In 2014, nearly half of Americans had their personal info exposed by hackers – and that doesn’t even count the many companies that experienced breaches.
Add a comment...

Post has attachment
Did you know we offer FREE security training for your employees. Here are some topics our security training includes:
✔️Personally Identifiable Information (PII)
✔️Internal and external threats
✔️Phishing and phone scams
✔️Passwords
✔️Wi-Fi dangers
✔️Physical protection for devices
✔️BYOD (Bring Your Own Device)
And more!
Add a comment...

Post has attachment
THE DAYS OF SIMPLE SECURITY MEASURES FOR TECHNOLOGY ENVIRONMENTS ARE OVER

Effective security is not simply marking off a checkbox, or completing a one-time project. You need to consider multiple aspects of security, all the time. At OXEN, our passion is security awareness. Our mission is to improve all three key aspects of your security: People, Policy, and Perimeter.

If you are ready to learn more give us a call 888-296-3619 or email hello@oxen.tech
Photo
Add a comment...

Post has attachment
What’s the solution to the growing problem of passwords? YOU, says Microsoft.

Quick: Change your password again. Make sure it has a combination of capital letters, numbers and special characters. Wait, no. Instead, come up with a long random phrase that you should be able to remember. Wait, no. Stop. Stop the madness! It’s time to kill the password.

This relic from the early days of computing has long outlived its usefulness, and certainly, its ability to keep criminals at bay. More than two-thirds of people use the same, usually not-very-strong password across dozens of different accounts. Weak passwords and stolen identities are the No. 1 source of data loss. Last year alone, 81 percent of major data breaches could be traced back to one individual’s compromised identity. Continuing Reading here:
Add a comment...

Post has attachment
Learn what makes rapid cyberattacks different from other attacks in Microsoft's Overview of Rapid Cyberattacks:

#OXENTechnology
#OXENsecure
Add a comment...

Post has attachment
You've probably heard all the popular security advice for your business. Firewall? Check. Anti-virus? Check. Password policies? Check. And so on. But here's another tool in the security arsenal to consider: network security monitoring.

Network security monitoring is a service that monitors your network (traffic and devices) for security threats, vulnerabilities, and suspicious behavior.

Continuing reading to learn how you can find the security threats in your network:

We are here to help! Reach out to one of our Sales reps, email us at hello@oxen.tech or call toll free 888-296-3619

#OXENTechnology
#OXENstrong
#OXENsecure
Add a comment...
Wait while more posts are being loaded