Home
Solutions down
BlueCentral BlueSecure BlueBackup BlueSky BlueMaintenance BlueStructure BlueVoice Custom Solutions
Tech Guides Company Blog & News Support Contact Careers
Midnight Blue logo
Contact Us Support

Best Practices

All Categories Best Practices Blog Posts Business Case Study Cloud Events MBTS Team Network Security News Security Tech Tips Technology Telephony Uncategorized

Best Practices

Why You Need Two-Factor Authentication (2FA) Now

03/18/2021

Whether you do it or not, you probably already know it’s in your best interest to update your passwords frequently. There are many tricks up hackers’ sleeves for finding out what your password is. And, even when you do frequently update them, we’re here to tell you it’s not enough. Hackers have simply become too […]

Read More...

Security Awareness Training is Your Best Defense

03/11/2021

Cybersecurity is a subject that you and every member of your organization should be taking seriously. It’s more important than ever when you have remote employees working outside of the office. By implementing a formal security awareness training program, you can ensure that every employee learns how to keep your network secure. And on the […]

Read More...

Data Privacy: Now and Moving Forward

02/10/2021

Clicking “Accept” has become a routine. We all must accept the terms and conditions, privacy policies and now cookies from every site and mobile app we use. Everyone is supposed to read the details in order to be aware of what they’re accepting. On the flip side, no one can move forward if they don’t. […]

Read More...

Employees, The Home and Network Security

12/14/2020

While most employees know never to use a public wifi in places such as a coffee shop, they tend to think that they are safe within their own home. Regrettably, this is not the case. Hackers and cybercriminals can be next door, in the driveway or even visitors. Therefore, any employee working remotely needs to […]

Read More...

How to Keep Your Mobile Device Secure

11/11/2020

Your mobile devices need security measures in place, just as your computer does. This includes your smartphones, tablets, and wearables. All are vulnerable to cyberattacks as well as theft. They can be hacked, have malware installed, and now, phishing attempts are appearing in messages. Typically, most people have a PIN, password, or swipe in place […]

Read More...

Midnight Blue logo

Sign Up For Newsletter

Navigate

  • Solutions
  • Company
  • Blog

Interact

  • Support
  • Pay My Bill
  • Contact

Get Social

  • Facebook
  • Twitter
  • Linkedin

4955 Steubenville Pike, Suite 160 Pittsburgh, PA 15205
Midnight Blue Technology Services, LP
412.342.3800

  • Privacy Policy
  • Sitemap