We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.

croom new

Preferred Blog

Preferred has been serving the Tinley Park area since 1991, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google’s AI Sees (and Understands) a Lot More Than You’d Expect

Google’s AI Sees (and Understands) a Lot More Than You’d Expect

Would you be concerned if someone, with only an image, could infer things about you with better-than-expected accuracy? I don’t mean snippets, either—we’re talking about entire paragraphs of context.

Probably, right?

How concerned would you be if I told you that’s precisely what Google Photos does?

Tags:
0 Comments
Continue reading

Managing Health Technology Has Its Challenges

Managing Health Technology Has Its Challenges

As technology continues to gain prominence in healthcare, it plays an increasingly vital role. Advancements in technology have allowed the healthcare industry to stabilize costs, improve access, and personalize care delivery—objectives that were challenging in the past. These benefits come with a potential downside: data privacy issues, which are becoming more concerning as technology advances.

0 Comments
Continue reading

Let’s Review Your Facebook Privacy Protections

Let’s Review Your Facebook Privacy Protections

Last week we went through some of the issues that Facebook is dealing with in regards to its security and data privacy. Today, we thought it would be helpful to give you the tools you need to protect your privacy on Facebook.

0 Comments
Continue reading

Let’s Remind Ourselves How Meta’s Security Has Failed

Let’s Remind Ourselves How Meta’s Security Has Failed

Facebook remains one of the most visited places on the Internet. Meta (the parent company to Facebook) also features WhatsApp and Instagram on their roster and has faced numerous security and privacy failings over the years. In this week’s blog, we’ll take a brief look at some of the most noteworthy.

0 Comments
Continue reading

What You Need to Know About Your Personally Identifiable Information

What You Need to Know About Your Personally Identifiable Information

Hackers are always on the lookout for personally identifiable information, or PII, as it’s an immensely lucrative resource. You’ll need to protect it if you want your business to continue operating safely and efficiently. Let’s go over what PII entails and what kinds of data you might find under this term.

0 Comments
Continue reading

3 Types of Regulations Your Business Should Be Aware Of

3 Types of Regulations Your Business Should Be Aware Of

Your business is likely subject to certain compliance laws and regulations depending on the type of data you collect from your clients or customers. Today, we want to emphasize the importance of your business considering regulation and compliance when managing its data and IT resources, as without doing so, you run considerable risk.

0 Comments
Continue reading

Digital Monitoring? It’s Great and Helpful, Under the Right Circumstances

Digital Monitoring? It’s Great and Helpful, Under the Right Circumstances

Digital monitoring is a bit of a contentious topic in business, but according to a survey from Gartner, it might not be as contentious of a topic as previously thought. In fact, employees are often in favor of digital monitoring under the appropriate circumstances, as long as it doesn’t get in the way of their jobs.

0 Comments
Continue reading

Who’s Really Hurt the Most by Card Skimmers?

Who’s Really Hurt the Most by Card Skimmers?

It probably isn’t a question you’ve put much thought to, but tell me: who do you think feels the greatest impact from card skimming schemes, where a payment card’s data is captured so a cybercriminal can make use of the card’s associated account? While it isn’t a good situation for anyone, some are impacted more than others.

0 Comments
Continue reading

What Exactly is Personally Identifiable Information?

What Exactly is Personally Identifiable Information?

It’s incredibly important to keep your personally identifiable information secure, but what exactly constitutes PII? Today we offer a definition and suggestions or strategies to help you keep your PII safe.

0 Comments
Continue reading

Microsoft Warns Against Password Spraying

Microsoft Warns Against Password Spraying

As time has passed, cybersecurity attacks have become another way some organizations and nations engage in warfare. You can argue that there is a war going on at all times in cyberspace while hackers—many of which are sponsored by government agencies—try to outdo security researchers at all turns. One such scenario sees customers in the United States and Israeli defense technology sectors becoming the target of “password spraying.”

0 Comments
Continue reading

Yes, You Can Outsource Hacking

Yes, You Can Outsource Hacking

Have you ever wondered what it takes to hire a hacker to perform a specific task? Thanks to the findings of Comparitech, we can get a look into the average pricings of various hacking services that can be found on the Dark Web. While we would never condone ever taking advantage of such services, it’s a fascinating look into the business of cybercrime, and one that can give you an idea of just how easy and accessible it is for hackers to make your life difficult.

0 Comments
Continue reading

Encryption Is a Major Key to Security

Encryption Is a Major Key to Security

The term “encryption” has found its way into the mainstream, appearing just about anywhere information security is brought up. Whether it is ransomware encrypting data or the encryption protecting your password security, it is a powerful tool that can be used for both good and evil. Let’s discuss the former and how you might use encryption in the workplace.

0 Comments
Continue reading

4 Ways to Keep Your Mobile Devices Safe While Traveling

4 Ways to Keep Your Mobile Devices Safe While Traveling

The world might still be suffering from a pandemic, but travel is slowly starting to pick up once again. When you feel safe and comfortable traveling again, it is of critical importance that you take steps to secure your technology while out of the office—especially your mobile devices. Here are some big ways that you can prioritize security while traveling.

0 Comments
Continue reading

Privacy Engineering is the Key to a More Secure Future

Privacy Engineering is the Key to a More Secure Future

Data privacy is a bit of a hot topic in today’s business environment, especially with high-profile hacks and ransomware attacks emerging and putting organizations at risk. In particular, the emerging concept of “privacy engineering” has a lot of businesses thinking about how they can secure their organization and future-proof their data privacy infrastructures.

0 Comments
Continue reading

Do Google’s New Policies on User Data Privacy Indicate Larger Changes?

Do Google’s New Policies on User Data Privacy Indicate Larger Changes?

Just in case you haven’t been paying attention, online privacy has been highlighted significantly in recent years—in no small part due to the sale of our profiles by the tech giants that provide today’s most (in)famous websites… including and especially Google. Having said this, it is also important to acknowledge that some of Google’s recent policy changes could suggest that this may change at some point.

0 Comments
Continue reading

Conduct a Security and Compliance Audit, You Won’t Regret It

Conduct a Security and Compliance Audit, You Won’t Regret It

If you are an avid reader of our blog, we are constantly saying how there are always a growing number of threats. This is true. Two-in-every-three business owners consider that their cybersecurity risks are increasing each year. The other third must not focus on them, and that is a problem. In fact, many business owners don’t give the proper respect to cyberthreats and many of those businesses pay the price. This is why every business should consider a security and compliance audit a mandatory part of their yearly IT assessment. 

0 Comments
Continue reading

Is Security Being Sacrificed for the Sake of Convenience?

Is Security Being Sacrificed for the Sake of Convenience?

While this time of year is always huge for online retail, there is likely to be a much larger number of people turning to the Internet for their holiday purchases than usual… and, it would seem, a larger number of people taking security into consideration as they do so. Let’s examine how consumers are taking their data into their own hands and what this means for your business.

0 Comments
Continue reading

How to Beat Cybercrime and Stay Secure

How to Beat Cybercrime and Stay Secure

Unfortunately, it is hard for the modern business to keep all of their data secure. There are just so many threats that most businesses leak data without even knowing it. There are things you can do, however. Today we will go through four considerations that can help you stay ahead of cybercriminals. 

0 Comments
Continue reading

Cybercrime Spiking During the Pandemic

Cybercrime Spiking During the Pandemic

Keeping your network and infrastructure free from threats is always a priority, but with so many people working remotely businesses have encountered problems doing so. In fact, hackers, known for their opportunism, have been ultra-opportunistic during this period and it is causing many headaches for network administrators. Let’s take a look at some statistics that are definitely concerning as we head into the fall, where many experts expect the virus to become more problematic. 

0 Comments
Continue reading

Do Your Privacy Practices Line Up With Your Privacy Expectations?

Do Your Privacy Practices Line Up With Your Privacy Expectations?

How concerned are you about your data privacy, as a consumer, particularly when you entrust it to another business? If you answered “very”, you aren’t alone… 87 percent of Americans consider their data privacy to be a human right. Having said that, most don’t pay near enough attention to their own security precautions. Let’s take a few moments and examine this trend.

0 Comments
Continue reading

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Blog Archive

      Latest Blog Entry

      Stuff happens, and this stuff can often be bad. That’s an inescapable part of life, especially if you’re trying to run a successful business. That said, the consequences of this bad stuff can usually be minimized—if not mitigated entirely—when you have a proper disaster reco...

      Latest News

      Best Places to Work - 5 YEARS STRONG!!

      Preferred is once again, honored for being a Best Place to Work for the fifth straight year!  Our team is what makes Preferred a Best Place to Work.  

      Daily Herald Suburban Business 2024 Best Places to Work Honorees The Daily Herald Suburban Business has announced the names of 51 companies, in 5 categories of competition, that are honored as the 2024 Best Places to Work in Illinois. This statewide survey and awards program was designed to identify, recognize and honor the best places of employment in Illinois, benefiting the state's economy, its workforce and businesses.