centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
+1 (954) 488-2643
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
Tips and Tricks
Home Tips and Tricks Page 3
Email ScamsNEWSPhishingTips and Tricks

Social Media Scare Tactics. A Scammers New Weapon

We often see scammers and hackers using scare tactics to try and get payment using bitcoin which is not backed by any financial institutions so makes it very difficult to recover any money sent.

Read More
Scott White Scott White July 8, 2020 0 Comments
83
NEWSPhishingTips and Tricks

What is MFA? Multi-factor Authentication (MFA) Explained

While many companies are today working from home, at some point, the workforce will return to the office. It is not clear what this will look like; it may be a small portion of workers heading back in phases or everyone at once.

Read More
Mary Kemper Mary Kemper July 6, 2020 0 Comments
71
Update Button on Computer Glass Keyboard
NEWSRansomwareTips and Tricks

COVID-19 vs Ransomware

The COVID-19 Pandemic is posing serious challenges to information security for firms of all sizes. As companies have sent some or all of their employees’ home to work remotely security challenges are more than ever in the hands of those individuals.

Read More
Michael Blair Michael Blair June 29, 2020 0 Comments
53
Email ScamsNEWSPhishingTips and Tricks

Watch out for this Windows Defender Scam!

Windows Defender scams have been around for years and we are seeing a new one making its rounds stating they have charged you $299.99 which is billed yearly and if you want a refund, they provide a number to call.

Read More
Scott White Scott White June 25, 2020 0 Comments
111
NEWSRansomwareTips and Tricks

Is BYOD Right for your Organization?

Bring Your Own Device, or simply BYOD remains both a major opportunity and challenge for small businesses and enterprises alike. By following the right approach to identifying BYOD risk and developing an effective BYOD policy it is possible to capitalize on the benefits of BYOD without adding significant risk.

Read More
Roland Rodriguez Roland Rodriguez June 17, 2020 0 Comments
62
  • 1
  • 2
  • 3
  • 4
Recent Posts
  • Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
  • Cybersecurity Threat Advisory: BlackMatter Ransomware
  • CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the Risk
  • 9 Cybersecurity Tips to Keep Your Device and Data Safe
  • Home Office Security – Never Too Late to Evaluate
Subscribe to our blog
We have lots of stuff for you to read.
Categories
  • Data Breach
  • tipsEmail Scams
  • HIPAA
  • newsNEWS
  • tipsPhishing
  • phishRansomware
  • Security
  • Tips and Tricks
  • Uncategorized
Most Viewed Posts
Search our Site

Centristic delivers the industry’s most complete IT security and secured solutions to small cap business. Whatever your IT security needs and goals, and wherever you’re starting,

Quick Links
  • Solutions
  • Services
  • Support
  • Company
  • Blog
Get In Touch

Adress:
5645 Coral Ridge Dr #230 Coral Springs, FL 33076-3124
Phone:
+1 (954) 488-2643
Business Hours:
Monday – Friday: 9am to 6pm
Saturday – Sunday: Closed

Copyright © 2020 Centristic. All Rights Reserved