Good Reads

Cybersecurity

How to Apply NAR’s Cybersecurity Checklist

The NAR Cybersecurity Checklist offers best practices to help real estate professionals keep up to date with cybercrime risks. Richard Hanson from JigsawTek is an expert in IT solutions and offers tech tips to help implement the best policies and procedures for your business.

Read More
good reads

Protecting Sensitive Information is Every Business’ Responsibility

First American has been charged by New York state in a massive unchecked data breach and could face nearly a $1 billion dollar fine! It’s unacceptable for companies to claim ignorance when it comes to private data they are entrusted to protect. Laws and civil suits will ultimately require businesses to “come to the table” with airtight technology and security measures.

Read More
good reads

Data Protection Tightens its Grip

As cybercrime changes rapidly and increases in sophistication, government agencies are developing laws to protect consumers. The European Union enacted the General Data Protection Regulation (GDPR) to help consumers control how data is handled and protected. And just this year, the California Consumer Protection Act (CCPA) enabled consumers to secure data and give consumers choice in how their personal information is used.

Read More
good reads

Big IT for Your Business

Have a custom IT team that fits your budget! JigsawTek believes all the benefits of a “big IT” team should be available at a reasonable cost. Let us show you how custom software and network security solutions allow your business to have all the benefits of a well managed solution.

Read More
Cybercrime News

Securing Endpoints

Traditional anti-virus software is not enough anymore—cybercriminals are becoming more sophisticated. Advanced protection models, such as SentinelOne and Cylance, leverage artificial intelligence to identify not just known threats, but to recognize patterns and stop malicious activity from infecting your technology. Even as an attack begins, these solutions can halt the attack and automatically roll your system back to the point immediately prior to the attack. JigsawTek can help you resolve all your technology protection needs.

Read More
good reads

Is a VPN Right for You?

Using that public Wi-Fi at Starbucks? Anything you send or receive is unprotected Wi-Fi and your info is open and available to anyone nearby with tools to receive it—like a hacker. Protect yourself with a Virtual Private Network (VPN). Check out this article about choosing the best one for you. At JigsawTek, we have highly rated VPNs available now. Call us and get started today!

Read More
Target Breach
good reads

Target and a Small Business

This is the story of how a data breach at an unwitting small business became the precursor to the infamous Target cyberattack in 2013 that exposed 40 million customers’ data!

Read More
Cybercrime News

15 billion stolen logins! That’s Two logins for every person on Earth!

It’s important to have different passwords, and to change passwords often. Cyber criminals are wise—they know people use the same credentials from site to site, and leverage this to get into other sites you visit—such as your bank account. Two factor authentication and a good password management tool is a game changer. See this article in Forbes about stolen logins on the Dark Web. Then call us at JigsawTek.

Read More
Cybersecurity

Cybersecurity Road Map

The U.S. Department of Homeland Security made this graphic of security layers a small business should have to protect against cyber attacks. Is your business prepared?

Read More