C2IT Blog

News, Resources & Links

Welcome to our blog. This is a place where we share our thoughts as well as links to great articles we hope you’ll find useful.
If you’d like to see us write about something specific, please feel free to fill out our contact form. Select Blog Suggestion from the dropdown menu.

Is Your Online Shopping App Invading Your Privacy?

Is Your Online Shopping App Invading Your Privacy?

Online shopping has become a common activity for many people. It's convenient, easy, and allows us to buy items from the comfort of our homes. But with the rise of online shopping, there are concerns about privacy and security.  Not all shopping apps are created...

3 Things Your Website Must Do

3 Things Your Website Must Do

Every Great Organization Needs a great website. Most organizations know that they should have a web presence, but not everyone understands how important your website really is to your overall brand as you seek to attract customers. Your website says a lot about who...

9 NSA Best Practices for Securing Your Home Network

9 NSA Best Practices for Securing Your Home Network

In today's world, technology is ubiquitous, and connectivity is a must. Securing your home network has become more critical than ever. A secure home network is essential for protecting your personal data from hackers.    From phishing to smishing (SMS phishing), it’s...

What Is Push-Bombing & How Can You Prevent It?

What Is Push-Bombing & How Can You Prevent It?

Cloud account takeover has become a major problem for organizations. Think about how much work your company does that requires a username and password. Employees end up having to log into many different systems or cloud apps.  Hackers use various methods to get those...

Free Fridays

Free Fridays

We all know the benefits of time off: personal rejuvenation and time with family and friends, just to name a couple. As business owners, we’re often the worst at truly taking time away from our businesses as we foster the “if it is to be, it’s up to me” mantra of the...

These Everyday Objects Can Lead to Identity Theft

These Everyday Objects Can Lead to Identity Theft

You wouldn’t think a child’s toy could lead to a breach of your personal data. But this happens all the time. What about your trash can sitting outside? Is it a treasure trove for an identity thief trolling the neighborhood at night?  Many everyday objects can lead to...