"

The Business Vault

No Honour Among Thieves

It’s a topic that feels unbelievable – the thriving industry of ransomware attacks. As with any business or market, when thieves are ...

Work and Personal Data: Don’t Use the Wrong Device at the Wrong Time

We’ve been saying this to our clients for years, but especially with many of us working from home, it needs to ...

The Most Efficient Way to Lose Information

  There are lots of cyber threats out there.  With this thought in mind, is the following statement TRUE or FALSE? “The best way to protect information is by isolating it in one place: your computer."

Don’t let passwords walk out of the door

The results of a recent lawsuit shine a light on the danger of not immediately disabling user logins when an ...

2021 New Year's Tech Resolutions

  "Tech Resolutions" are simple: they're tech-based habits, some that you need to start doing, some need to be ...

Why should you get in the habit of using a VPN?

  TV shows and movies are rife with scenes of bad guys compromising wireless devices like cell phones, tablets and laptops.  It’s ...

What do oil filters have to do with IT?

When I graduated from college, my first job was as an electrical controls designer at an engineering firm.  At about the same ...

Free Cyber Security Checklist

Think fast: what’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince wanting to give you a sum of $34 million? Okay, you most ...

How to secure your business from the inside in 4 steps

Research has shown that when it comes to cybersecurity in organizations, your people are your greatest risk. (A 2016 IBM study, for example, attributed 60% ...

The 5-minute guide to security assessments: Why, when and how

A security assessment is a periodic review to see how prepared your organization is for a cybersecurity breach. The assessment helps you check for ...

Contact

Birmingham Consulting Inc.Birmingham Consulting Inc. Logo $$$