Passwordless Authentication
Passwordless Authentication what is it, how does it work, and why would I want it? There is a fine line between being secure and being productive in the work environment. Passwords are no exception when it comes to security vs. productivity. Whether signing in...
Phishing and Multi-Factor Authentication
PLEASE READ THIS IMPORTANT ARTICLE FULLY. THE NEXT TWO MINUTES MAY SAVE YOU HOURS IN LOST PRODUCTIVITY. As you may or may not know, there has been an increase in phishing attempts specifically aimed at Microsoft 365 subscribers. You can reference an article on our...
Windows 10 – End of Service?
You might have read that title and thought, “What, are they crazy, no way!” Truth is, all Microsoft Windows products have a lifecycle. The lifecycle of a product begins when a product is released and ends when the product is no longer supported. Even Windows 10 has a...
Security Awareness Month – Phishing Schemes
Phishing schemes are getting more elaborate these days. Employing social engineering techniques that can fool even the savviest person. Recently, I received an email that looked extremely legit when glanced at quickly, but closer inspection revealed tell-tale signs of...
Cloud App Security
Next-Gen Security for Office 365, G Suite, and Other SaaS apps Contact Us today to learn how we can help.
The folder that doesn’t exist…
Update: I recently ran into this issue again, this time it was a file that had a trailing space and not the folder. To resolve the issue with the trailing space on the file, I created a new folder so that I could move all of the existing files to this new folder...
SelecTech, Inc.
717.774.2018
1542 Bridge Street, New Cumberland PA 17070