by Quikteks Blog | Apr 24, 2017 | Business, Quikteks Blog, Security
In October of 2016, the Federal Communications Commission designed a set of rules known as the Broadband Consumer Privacy Proposal. These rules had intended to flip the status quo and require Internet service providers (ISPs) to gain their customers’ permission...
by Quikteks Blog | Jan 16, 2017 | How To, Quikteks Blog, Unused
Worrying About RATS Yes, webcams are susceptible to invasion by Remote Access Tools. RATs, as troublesome as their furry namesakes, can be used to remotely access a computer and perform any number of functions, including turning on a device’s webcam. RATs are...
by Quikteks Blog | Jan 3, 2017 | Best Practices, Security
Data might be the most important aspect of your organization, but how well do you protect it throughout your network? Every organization has data like personally identifiable information and financial credentials stashed away somewhere on the network, so security...
by Quikteks Blog | Dec 5, 2016 | Best Practices, Quikteks Blog, Security
It seems that you can find absolutely anything online, but unfortunately, this includes cyber threats. No deal is worth getting hacked, so here are some best practices that can help you stay safe while bargain hunting. Stick to Well Known Companies When shopping...
by Quikteks Blog | Sep 6, 2016 | Quikteks Blog
Do you remember how your bank issued you a new debit or credit card with a built-in, security-enhancing chip? There are now ATMs specially designed for use with these chips. Unfortunately, the same technology that was originally meant to secure your finances can also...