Crown Logo

Technology Support For San Diego Since 1996

Click here for 60 minute consultation858-483-8770
Watch Out for HTML in Emails!

Watch Out for HTML in Emails!

With the new year here, it might be time to not just look forward, but take stock of something that comes up a lot on the blog: email safety. Email is probably the most reliable way of communicating with people between organizations, but it can be messy and unusable...
3 Security Services to Consider in 2023

3 Security Services to Consider in 2023

If you’ve had a good year security-wise, you may not be thinking about how to enhance your company’s defenses against malware and scams. Having a year with no intrusions or ransomware doesn’t predict that your security will perform equally as well in the new year....
3 Reasons to Secure your Whole Life with MFA

3 Reasons to Secure your Whole Life with MFA

If you use Multi-Factor Authentication (MFA) for your business systems, then you know that it can give you a lot of piece of mind when protecting logins and other credentials. It’s also the right choice for personal security, but some people find it too much of a...
Cyber Threats, Data Leaks, and Credit: What you Should Know

Cyber Threats, Data Leaks, and Credit: What you Should Know

On this blog we often talk about ways to keep your network secure to protect your proprietary and sensitive information. It’s easy to lose sight of the fact that major corporations face the same challenges, just at a much larger scale. For a lot of major...
Reactive Network Defense with Honeypots

Reactive Network Defense with Honeypots

We’ve written on this blog about keeping your network safe by using strong authentication, advanced firewall technology, and modern antivirus software. Today, we’ll discuss another strategy for securing your networks: the honeypot. This technique allows...
Top 11 Wireless Home Network Security and Usability Tips

Top 11 Wireless Home Network Security and Usability Tips

Replace routers at least once every five years. This helps keep you secure by not falling behind on updates and patches, since new vulnerabilities are patched for newer devices, but older devices’ software may not keep being maintained. Adopt the latest wireless...