• (844)GEEK-BOX
  • [email protected]
  • Get Support
Business IT Solutions Greensboro, NC | GeekBox IT, LLC Business IT Solutions Greensboro, NC | GeekBox IT, LLC
  • Home
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Employment
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring and Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Content Filtering
      • Spam Protection
      • Security Cameras
      • Email Encryption
      • Fully Hosted Security as a Service
      • Access Control Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
    • Industry Specific
      • Healthcare IT
      • IT for Law
      • Manufacturing IT
      • Point-of-Sale Technologies
      • IT for Education
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring Services
      • Wireless Services
      • High-Speed Internet Consulting
      • Printer Management
      • Office Relocation Services
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • VoIP
      • Fax Server
      • Conferencing
      • Digital Signage
      • Unified Communications
    • Media & Internet Services
      • Website Design
  • Understanding IT
    • Ransomware
    • Shadow IT
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • Windows 11
    • The Internet of Things
    • Network Security
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing
  • News & Events
  • Blog
  • Contact Us
  • Support
    • Help Desk
    • Remote Support Tool
Business IT Solutions Greensboro, NC | GeekBox IT, LLC
  • Home
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Employment
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring and Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Content Filtering
      • Spam Protection
      • Security Cameras
      • Email Encryption
      • Fully Hosted Security as a Service
      • Access Control Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
    • Industry Specific
      • Healthcare IT
      • IT for Law
      • Manufacturing IT
      • Point-of-Sale Technologies
      • IT for Education
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring Services
      • Wireless Services
      • High-Speed Internet Consulting
      • Printer Management
      • Office Relocation Services
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • VoIP
      • Fax Server
      • Conferencing
      • Digital Signage
      • Unified Communications
    • Media & Internet Services
      • Website Design
  • Understanding IT
    • Ransomware
    • Shadow IT
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • Windows 11
    • The Internet of Things
    • Network Security
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing
  • News & Events
  • Blog
  • Contact Us
  • Support
    • Help Desk
    • Remote Support Tool

Security

Nothing Good Comes from Card Skimmers

November 25, 2022 GeexBox IT
Nothing Good Comes from Card Skimmers

Card skimming is a very real problem for companies and individuals alike, but there will always be those who are more impacted by these kinds of financial scams—particularly those who rely on prepaid cards provided by the government for food assistance and so on.

Read More
GeekBox IT Blog Security

Whoops! Microsoft Update Has Been Missing This Critical Security Vulnerability

November 7, 2022 GeexBox IT
Whoops! Microsoft Update Has Been Missing This Critical Security Vulnerability

For the most part, Microsoft takes security as seriously as it should, issuing updates and patches to maintain your Windows and Server operating systems. While you can count on receiving these updates for your supported operating systems, what you might not have known is that Microsoft accidentally overlooked a flaw in its own defenses.

Read More
GeekBox IT Blog Security

Network Segmentation is a Smart Move for Business Cybersecurity

November 4, 2022 GeexBox IT
Network Segmentation is a Smart Move for Business Cybersecurity

When it comes to your network and its security, you cannot give all of your users access to all of your assets. It’s just not a good practice, and doing so can potentially put your resources at risk. Let’s discuss how network segmentation can make a world of difference for the integrity of your network and the data found on it.

Read More
GeekBox IT Blog Security

Cybersecurity Social Event

November 2, 2022 Erick Smith

Join us for a free opportunity to learn more about cybersecurity and learn more about how we can help protect your business against cyber threats. This event is completely FREE! We will have Food, Beer, Wine, and Raffle Prizes for Attendees. Please RSVP at https://geekboxit.com/rsvp

Read More
GeekBox IT Blog Security

Why Security Questions are Terrible for Security

October 21, 2022 GeexBox IT
Why Security Questions are Terrible for Security

What is your mother’s maiden name? What street did you grow up on? What is your favorite movie? How about: What good do you really think these questions are going to do to help keep your accounts any more secure?

Read More
GeekBox IT Blog Security

Everything You Need to Know About Patch Tuesday

October 19, 2022 GeexBox IT
Everything You Need to Know About Patch Tuesday

In the technology news sector, you’ve probably noticed a trend where Patch Tuesday makes headlines at least once a month. This is generally the day when Microsoft issues patches and security updates for its many different technologies, and it’s important for your IT department to know when Patch Tuesday falls each month.

Read More
GeekBox IT Blog Security

These Are the Ways You Get Malware

October 17, 2022 GeexBox IT
These Are the Ways You Get Malware

Malware has been a problem for people that rely on technology for decades. Like the security that is designed to mitigate the effect of malware, the malware itself has grown in potency and frequency and is a major problem for businesses. Today, we will take a look at a few ways you can get malware. 

Read More
GeekBox IT Blog Security

A Few Useful Insights into Online Payment Fraud

October 14, 2022 GeexBox IT
A Few Useful Insights into Online Payment Fraud

Financially-focused cyberthreats are no joke, especially considering how digital payments now make up 41.8% of all payments made worldwide. Let’s consider a few statistics that highlight how important it is to ensure that the payment card data your business collects is sufficiently protected.

Read More
GeekBox IT Blog Security

Multi-Factor Authentication isn’t Infallible, But It Shouldn’t Be Abandoned

October 7, 2022 GeexBox IT
Multi-Factor Authentication isn’t Infallible, But It Shouldn’t Be Abandoned

We haven’t been shy about pushing for multi-factor authentication, AKA MFA, and there’s a reason for that: if implemented correctly, it can help prevent many cyberthreats. Having said that, cybercriminals have managed to find a way to undermine MFA. Let’s consider how they’ve managed to do this.

Read More
GeekBox IT Blog Security

Who’s Sitting at the Other Keyboard While You’re Being Attacked?

October 3, 2022 GeexBox IT
Who’s Sitting at the Other Keyboard While You’re Being Attacked?

It can be too easy to think about hackers and cybercriminals in an almost abstract way, diminishing them to little more than a faceless entity at a keyboard. Naturally, this is far from the truth. Let’s examine the reality of the cybercrime industry, which actually does as much harm to the perpetrators as it does to the people they scam…if not more.

Read More
GeekBox IT Blog Security
  • 1
  • 2
  • 3
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • …
  • 25
  • 26
  • 27
Posts by Topic
  • Best practices
  • Business
  • Cloud
  • GeekBox IT Blog
  • How to
  • IT Blog
  • Miscellaneous
  • News and Events
  • Off Topic/Fun
  • Security
  • Technology
  • Tip of the Week
Tag Cloud
AI Android Backup Best Practices Business Cloud Collaboration Computer Current Events Data Disaster Recovery Efficiency Email Google Hackers Hardware Hosted Solutions Innovation Internet IT Services IT Support Malware Managed Service Microsoft Mobile Device Mobile Devices Network Security Phishing Privacy Productivity Quick Tips Ransomware Remote Saving Money Security Small Business Software Technology Tip of the Week Upgrade Users User Tips Windows Workplace Strategy Workplace Tips
Blog Archive
  • 2026
    • January
  • 2025
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2024
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2023
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2022
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2021
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2020
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2019
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2018
    • December
Mobile? Grab this Post
QR Code
Home » GeekBox IT Blog » Security » Page 12

Request a Consultation
GeekBox IT strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
  • You Can, in Fact, Communicate Too Much in the Workplace

    We’ve all been there: You’re deep into a complex problem, finally finding your rhythm, when, “ping”… A quick question pops up on one of…

    Read More »

Contact Us
Learn more about what GeekBox IT can do for your business.

1250 Revolution Mill Drive Suite 166,
Greensboro, NC, 27405

Call us: (336) 790-1000

Facebook-f Rss

Copyright 2026 GeekBox IT. All Rights Reserved. Privacy Policy | Terms & Conditions | Sitemap

poweredbyjoomconnect_white
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}