We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.

croom new

Preferred Blog

Preferred has been serving the Tinley Park area since 1991, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Secure Your File-Sharing Practices for Improved Operations

How to Secure Your File-Sharing Practices for Improved Operations

Collaboration is as important as ever, if not more so, to businesses of any size… and with so much work today being done digitally, this collaboration needs to be reliable. Add in the fact that so many people work remotely as often as they do, and it should be clear that all businesses need a means of securely collaborating as part of their successful operations.

0 Comments
Continue reading

How Business Email Compromise Puts Your Business at Risk

How Business Email Compromise Puts Your Business at Risk

Can you tell the difference between your colleagues and a scammer with access to their email account? This is essentially what a business email compromise attack involves—a scammer initiates a phishing scheme using an internal mode of communication. These scams are also observed in schools, making them dangerous in the education sector.

0 Comments
Continue reading

Zero-Trust Needs to Be the Goal for Every Business’ Security

Zero-Trust Needs to Be the Goal for Every Business’ Security

Would you feel safe staying at a hotel that, instead of unique locks, each door used the same key as all of the others? Probably not—because if someone got in, they could take whatever they wanted. That’s similar to how old-school cybersecurity worked. Once someone got into a company’s network, they could access almost everything, making it easy for hackers to steal information. But today, many businesses use a better security framework called zero-trust security. In today’s blog, we discuss what zero-trust security is and why it’s safer.

0 Comments
Continue reading

Your Business Isn’t Too Small to Be a Target for Hackers

Your Business Isn’t Too Small to Be a Target for Hackers

"I don’t need to worry about cybersecurity… my business is too small for hackers to target."

This is one of the most dangerous misconceptions a small business can have. If you believe this, you may not fully understand how modern cyberattacks work. Let’s break down why this mindset can leave your business vulnerable.

0 Comments
Continue reading

The NIST Recommends This 5-Stage Cybersecurity Framework

The NIST Recommends This 5-Stage Cybersecurity Framework

If there’s one thing that helps businesses establish consistent policies and strategy, it’s a good framework. You can use a framework for anything, including network security. Today, we want to walk you through the cybersecurity protection standards as they are outlined by the National Institute of Standards and Technology so you can better protect your business.

0 Comments
Continue reading

How to Keep Your Employees from Being a Cybersecurity Problem

How to Keep Your Employees from Being a Cybersecurity Problem

Cybersecurity has to be a big deal for any business that uses IT, and today, who doesn’t? When your employees don’t follow cybersecurity rules, it can put your business in danger, like getting hacked or losing money. The first step is to figure out why employees aren’t following the rules. This could happen because they don’t know the rules, haven’t been trained enough, or think the rules are too hard or take too much time. 

0 Comments
Continue reading

Pig Butchering is a Serious, Growing Problem

Pig Butchering is a Serious, Growing Problem

Over the past few years, huge scamming operations have operated in Southeast Asia, and now they are spreading. These scams—known as pig butchering scams—cause serious harm, as in an estimated $75 billion worldwide in 2023.

With these sorts of operations spreading, let’s go over what pig butchering is. 

0 Comments
Continue reading

If You See Someone Streaming Funeral Services, You’ve Spotted a Likely Scam

If You See Someone Streaming Funeral Services, You’ve Spotted a Likely Scam

Funerals are never to be taken lightly, which makes it all the worse that there are people out there willing to use these events to scam those in grief. Recently, Facebook has seen many groups that supposedly offer links to streamed funerals in exchange for credit card data, with different events being added more recently.

0 Comments
Continue reading

Password Managers are an Office Worker’s Best Friend

Password Managers are an Office Worker’s Best Friend

Protecting your business’ accounts is something we will advocate for on repeat. You’ll hear us tell you about complex and unique passwords and multi-factor authentication until you’re sick of hearing it. But one tool that our clients sometimes forget is the password manager—an equally useful tool that can help your business keep passwords safe and secure.

0 Comments
Continue reading

What’s Going on With Telegram and the State of Encrypted Communication?

What’s Going on With Telegram and the State of Encrypted Communication?

Sorry for the loaded title. There’s a lot to talk about, even for those of you who don’t use or even know what Telegram is.

We’ll try to sum this up, because we think there is a lot to say about security and the nature of technology in this, and like all things these days, there’s some odd rabble-rousing about this whole series of events. Who’s up for a wild ride?

0 Comments
Continue reading

Make a Complex Password with This Catchy Trick

Make a Complex Password with This Catchy Trick

You should always use strong passwords for each and every account. Cybercriminals don’t need to put much effort into cracking a password these days—it only takes a little software and standard computer hardware to crack millions of passwords in just a second or two.

The more complex and random a password is, the more secure it is.

But coming up with (and memorizing) complex passwords is really difficult. This trick should make it a whole lot easier.

0 Comments
Continue reading

Phishing: What It Is, and How to Avoid It

Phishing: What It Is, and How to Avoid It

Potential data breaches are increasingly problematic for organizations, and the most common way that data is stolen is through phishing attacks. Phishing attacks are currently one of the most pervasive threats on the Internet, and you need to understand them to thwart their effectiveness against your users. Let’s explore what exactly a phishing attack consists of and some best practices you can use to defend your network against them.

0 Comments
Continue reading

Please, Please, PLEASE Don’t Include Sensitive Info in Your Emails

Please, Please, PLEASE Don’t Include Sensitive Info in Your Emails

Email is a great communication tool. However, certain things are just unsafe to communicate via email.

Let’s go through a list of such things. Better safe than sorry, after all.

0 Comments
Continue reading

Let’s Review Your Facebook Privacy Protections

Let’s Review Your Facebook Privacy Protections

Last week we went through some of the issues that Facebook is dealing with in regards to its security and data privacy. Today, we thought it would be helpful to give you the tools you need to protect your privacy on Facebook.

0 Comments
Continue reading

Let’s Remind Ourselves How Meta’s Security Has Failed

Let’s Remind Ourselves How Meta’s Security Has Failed

Facebook remains one of the most visited places on the Internet. Meta (the parent company to Facebook) also features WhatsApp and Instagram on their roster and has faced numerous security and privacy failings over the years. In this week’s blog, we’ll take a brief look at some of the most noteworthy.

0 Comments
Continue reading

Microsoft Defender: An Example of Why Consumer-Grade Security is Not Enough

Microsoft Defender: An Example of Why Consumer-Grade Security is Not Enough

Windows Defender is Microsoft’s own antivirus solution, and it comes bundled with Windows, so it’s confusing to think that a business would need to pay for it, right? Well, there are actually two separate products called Defender, with a big difference between them.

0 Comments
Continue reading

CDK Cybersecurity Incidents Cause Massive Chaos in the Car Industry

CDK Cybersecurity Incidents Cause Massive Chaos in the Car Industry

A popular automotive dealership software platform has recently become the target of a cyberattack, resulting in the solution going down for several days. Any business that has a solution it relies on can sympathize with the situation. After all, if you lose access to your critical business apps for several days, would your operations be able to recover?

0 Comments
Continue reading

Your Email is Insecure - Businesses Need Email Encryption

Your Email is Insecure - Businesses Need Email Encryption

All businesses use email to communicate, but too many organizations haven’t jumped on the encrypted email bandwagon yet. Encryption is incredibly helpful to keep networks and infrastructure secure, and it can do the same for your email solution. In fact, it is likely required to ensure the secure transfer of critical and sensitive information.

0 Comments
Continue reading

Encryption is One of the Most Valuable Tools Against Hackers

Encryption is One of the Most Valuable Tools Against Hackers

Encryption is a powerful weapon against hackers that can prevent them from stealing your data and leveraging it against you. Encryption, in its most basic textbook definition, converts your readable data into an indecipherable jumble that can only be reassembled through the use of an encryption key. Small businesses absolutely must utilize encryption to protect customer information, financial records, and other important or sensitive business data. This ensures that it is as protected as possible against those that might do you harm.

0 Comments
Continue reading

This Cybersecurity Professional is Out to Scam the Scammers

This Cybersecurity Professional is Out to Scam the Scammers

Scammers look to take advantage of someone else for their own gain, but there are some scammers out there who are trying to scam the scammers to teach them a lesson. One such individual is “Kitboga,” a content creator who calls themselves a “scam baiter.”

0 Comments
Continue reading

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Blog Archive

      Latest Blog Entry

      Collaboration is as important as ever, if not more so, to businesses of any size… and with so much work today being done digitally, this collaboration needs to be reliable. Add in the fact that so many people work remotely as often as they do, and it should be clear that all...

      Latest News

      Best Places to Work - 5 YEARS STRONG!!

      Preferred is once again, honored for being a Best Place to Work for the fifth straight year!  Our team is what makes Preferred a Best Place to Work.  

      Daily Herald Suburban Business 2024 Best Places to Work Honorees The Daily Herald Suburban Business has announced the names of 51 companies, in 5 categories of competition, that are honored as the 2024 Best Places to Work in Illinois. This statewide survey and awards program was designed to identify, recognize and honor the best places of employment in Illinois, benefiting the state's economy, its workforce and businesses.