Category: Security

stack of old business electronic devices like computers

How to Safely Dispose of Electronic Devices

When your business gets new computers, what do you do with the old ones? Let our Field Tech guide you on proper disposal of electronic devices.
blog panel recap navigating data and security

Panel Recap: Navigating Data Privacy and Cyber Security during COVID-19

Local insurance, legal, and technology experts hosted a virtual panel on Navigating Data Privacy and Cyber Security during COVID-19. Watch the recording and get key takeaways here.
eyes behind code showing data privacy

How Data Privacy is Good for Business

January 28th is Data Privacy Day, and Infinity, Inc. has tips for individuals and for businesses to better protect personal information.
person shopping online on mobile

6 Tips for Online Shopping Protection

From Thanksgiving to New Year’s, we spend billions buying gifts and supporting charities. Get 6 tips for better online shopping protection, and keep your holidays happy and safe.
business woman learning truth about cybersecurity misconceptions

Top 10 Cybersecurity Misconceptions of SMBs

Get the truth about the 10 most common cybersecurity misconceptions held by SMBs today. Plus learn how to take action on each one to better protect your business and your clients.
child on parents lap using laptop for cybersecurity awareness

Infinity, Inc. Recognized as Cybersecurity Awareness Month Champion

October is National Cybersecurity Awareness Month, and Infinity, Inc. is committed to promoting the awareness of online safety and privacy. Learn how here.
website cloning with laptops and code

Attack of the Clones: How to Avoid the Website Cloning Trap

Website cloning is one of the most popular methods among scammers to fleece you of your money. And when it's your business website that gets cloned, you can lose customers, credibility, and more.
2020 on road to sunlight for Windows 7 update

2020 Vision: Why You Need a Windows 7 Update Plan Right Now

A reported 37% of all PCs are currently running Windows 7, and its end of life is fast approaching. Learn the impact and how to plan your smooth transition here.
human trait shared by cyber crime victims

The One Human Trait Guaranteed to Make You a Victim of Cyber Crime

Ever wonder how cyber criminals choose their targets? This common characteristic could make you the next victim of a cyber crime attack.