Multi Factor Authentication

Before we go into detail why you should implement Two-factor, or Multi-factor, authentication for online accounts like Microsoft Office 365 or Google G-Suite, we should discuss the root cause behind our recommendation.  It all started with Social Engineering. Social...

Vishing

Vishing, or Voice Phishing, has been around for quite some time. It may not be the latest tool in a cyber criminal’s tool-belt, but its effectiveness keeps it as a top concern for us at BBTech. In this week’s security video, learn more about Vishing Scams and...

Security Tips – Apple iTunes Gift Card Scam

New scams have emerged targeting Apple users. By claiming to be members of Apple Support, scammers are tricking individuals out of their hard-earned money! In this week’s security tip, learn more about this latest scam and how you can avoid becoming the next victim. ...

Cable Internet Service – you get what you pay for

As IT consultants, we’re often in a position to advise clients about lots of things, one of which is their choice of internet provider. Sometimes they will consult us before a purchase, and sometimes they won’t. We hope this article will serve to educate you on the...