Cyber Security

Our cyber security articles highlight the necessity for taking cyber threats seriously and protecting your business or organization from cyber risks. Learn the best steps to take and applications you can implement to secure your sensitive and confidential information. Read about multi-factor authentication, phishing emails and more. Start monitoring, verifying and managing your user access.

IMAP Security Issues image

IMAP Security Issues – Is this Legacy Email Protocol Leaving You Vulnerable?

By The Aeko Tech / January 14, 2021

From time to time, a cyber security issue pops up that no one sees coming. That’s the case with the IMAP security problem that’s recently come to light. As a…

Read More
2020 Ransomware Attacks image

The 4 Worst Ransomware Attacks of 2020 & Why 2021 Should Start With Back-Ups

By Brian Rodgers / January 7, 2021

When ransomware attacks make headlines, they tend to involve big, well-known companies. But this news is just the tip of the iceberg: Some of the largest entities hit in 2020…

Read More
Information Security image

Information Security vs Cyber Security

By The Aeko Tech / November 6, 2020

Small businesses need to focus a little less on cyber security alone and look more at information security. This was one of many IT insights that Aeko Technologies CEO Brian …

Read More
password management image

Super Simple Password Management Guide for the Office (and Beyond)

By Brian Rodgers / October 29, 2020

Gone are the days when a good password alone gave you cybersecurity. But if your password is weak, overused or contains personal data, the best cybersecurity system in the world…

Read More
Cyber Security Management image

Bulletproof Your Cyber Security Management by Layering Services

By Brian Rodgers / October 22, 2020

Businesses are getting hit hard these days with messaging about cyber security tools and services. But it’s important to remember that good cyber security management is a lot like a…

Read More
work from home image

Survival Stories: The COVID Work From Home Shift

By The Aeko Tech / October 8, 2020

Which small businesses were impacted less by the COVID work from home shift in March 2020? And what made them more resilient? Aeko Technologies CEO Brian Rodgers discussed this and…

Read More
SIM Hijacking image

Not Able To Text or Make Calls? It Could be SIM Hijacking

By The Aeko Tech / September 24, 2020

If your phone suddenly loses the ability to place calls or send and receive texts, you may be victim of a cyber crime. Whether you call it SIM hijacking, SIM…

Read More
data breach image

Preventing A Data Breach: What Businesses Should Learn From Cooke County, TX

By Brian Rodgers / September 10, 2020

The thing about the Cooke County, Texas, cyber attack is that it was a ransomware attack AND a data breach. In fact, these two things go hand in hand more…

Read More
ransomware prevention image

Don’t Be That Guy: Ransomware Prevention In 2020

By The Aeko Tech / September 3, 2020

The recent cyber attack on Garmin highlights the severity of ransomware. It’s also bewildering: After all, there’s just no excuse for being victimized by a ransomware attack anymore. Here are…

Read More
how to spot a phishing email image

How to Spot a Phishing Email

By The Aeko Tech / August 15, 2020

Can You Spot a Phishing Email? If you know what to look for, phishing emails are easy to spot. Even though phishing scams are always evolving, knowing just the basics…

Read More