<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.fgmts.com/blogs/author/erick-mccollum/feed" rel="self" type="application/rss+xml"/><title>FGM Technology Services - Blog by Erick McCollum</title><description>FGM Technology Services - Blog by Erick McCollum</description><link>https://www.fgmts.com/blogs/author/erick-mccollum</link><lastBuildDate>Sun, 08 Feb 2026 16:52:22 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Top 5 IT mistakes small businesses make (and how to avoid them)]]></title><link>https://www.fgmts.com/blogs/post/top-5-it-mistakes-small-businesses-make-and-how-to-avoid-them</link><description><![CDATA[For small businesses with little to no IT resources, it can be daunting to keep up with your IT systems and security. However, that doesn't mean it's not possible. Partner with FGM Technology Services, and together we can make sure you avoid the following five IT mistakes.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_5T62mbrdSLKCzUOzjH8uAA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8U5BSe7mSXa0PU22TU2sBQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sY19pwSrT7OMRE3u_ty4CQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5DPw15DfRu2YZY-Grekyog" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="text-align:left;">For small businesses with little to no IT resources, it can be daunting to keep up with your IT systems and security. However, that doesn't mean it's not possible. Partner with FGM Technology Services, and together we can make sure you avoid the following five IT mistakes.&nbsp;</div><div style="text-align:left;"><br/></div><h4 style="text-align:left;">1. Ignoring cyber security basics&nbsp;</h4><div style="text-align:left;">Many small businesses assume they're too small to be targeted by cyber attacks, but that's not true. While you may not need a deep, comprehensive approach to cyber security, it is still vital to cover the basics. FGM Technology Services can provide you with an information security assessment and plan to meet your needs and protect your business from cyber attacks.</div><div style="text-align:left;"><br/></div><h4 style="text-align:left;">2. Not backing up data properly</h4><div style="text-align:left;">Does your business rely on local data backups or none at all? Don't risk permanent data loss after hardware failure or a cyber attack. FGM Technology Services can help you implement a more comprehensive data backup strategy.</div><div style="text-align:left;"><br/></div><h4 style="text-align:left;">3. Using outdated hardware and/or software</h4><div style="text-align:left;">Are you saving money by relying on older hardware or software? It may seem like a great idea now, but it is a big risk. FGM Technology Services can help you develop a hardware lifecycle plan, regularly update your systems, and invest in reliable equipment.</div><div style="text-align:left;"><br/></div><h4 style="text-align:left;">4. Lacking an IT strategy or plan</h4><div style="text-align:left;">Are you reacting to IT issues instead of proactively planning? This can result in inefficiency and missed opportunities. FGM Technology Services can help create an IT strategy plan that aligns with your business' needs and goals. Let's work together to help you plan and prepare, rather than react.&nbsp;</div><div style="text-align:left;"><br/></div><h4 style="text-align:left;">5. Neglecting employee IT training</h4><div style="text-align:left;">People are often the weakest link in any cyber security approach. Security controls can only protect so much. To really protect your business and its data, you need to ensure your employees are trained and aware of cyber security basics. Partner with FGM Technology Services, and let's create a simple, practical employee IT training program together.&nbsp;</div><br/></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 22 Oct 2025 07:01:21 -0600</pubDate></item><item><title><![CDATA[Three signs that your business data is at risk]]></title><link>https://www.fgmts.com/blogs/post/three-signs-that-your-business-data-is-at-risk</link><description><![CDATA[According to IBM, the average cost of a data breach in 2025 is $4.4 million. Sound scary? It is! Here are three signs that your business data is at risk.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uvVKyS7ARoy_nqJ2X3Lngg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_AjuzAMHFTrK_RE4ait_5Dw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_kXYRJOU5TDaU3-uDaOar2Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qzjYqyevTzuQPMGfMj_b9A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="text-align:left;"><div style="text-align:left;">Data security and privacy is one of the biggest risks for businesses today. However, it rarely gets the attention it deserves. Unfortunately, it is common for small businesses to not have a proper cyber security plan or controls in place. While it may not seem necessary most of the time, all it takes is one incident for a business to be catastrophically impacted.&nbsp;<span style="font-weight:bold;"><br/></span></div><div style="text-align:left;"><span style="font-weight:bold;"><br/></span></div><div style="text-align:left;"><span style="font-weight:bold;">According to <a href="https://www.ibm.com/reports/data-breach" title="IBM" target="_blank" rel="nofollow noreferrer noopener"><span style="text-decoration:underline;">IBM</span></a>, the average cost of a data breach in 2025 is $4.4 million.&nbsp;</span>Sound scary? It is! Here are three signs that your business data is at risk.&nbsp;</div><div style="text-align:left;"><br/></div><h4 style="text-align:left;">1. You don't have someone responsible for information security</h4><div style="text-align:left;">Every business, no matter how small, should choose someone to be responsible for information security. This could be an employee or a third-party company (such as FGM Technology Services). Ideally, this should be in writing somewhere, such as an information security policy.&nbsp;</div><div style="text-align:left;"><br/></div><div style="text-align:left;">The actual scope of this person's role can vary according to the business' size, budget, and needs. It may be as simple as knowing who to contact if a cyber security incident occurs. Not every business can afford the most comprehensive security systems or controls, and that's okay. The most important thing is that someone is responsible for information security and owns it.</div><div style="text-align:left;"><br/></div><h4 style="text-align:left;">2. You don't have an incident response plan or data backups</h4><div><div>Every business should have an incident response plan and data backups. If you don't, please <a href="/contact" title="contact us" rel=""><span style="text-decoration:underline;">contact</span></a>&nbsp;FGM Technology Services now.&nbsp;</div><div><br/></div><div>The incident response plan doesn't need to be especially detailed or comprehensive. As mentioned in the last section, it could be as simple as specifying who to contact (hint: FGM Technology Services) in the event of a cyber security incident.&nbsp;</div><div><br/></div><div>Data backups are critical for recovery from a cyber security incident. With proper data backups, your organization can save a ton of time and money in the event they are needed. Please trust us, you'll sleep better at night knowing that your data is backed up and safe.</div></div><div style="text-align:left;"><br/></div><h4 style="text-align:left;">3. You don't partner with FGM Technology Services</h4><div>This should have been first on the list. If you don't partner with FGM Technology Services, then you're missing out! Not only will FGM Technology Services help protect your data, but it can be done in an affordable way that doesn't break your budget. FGM Technology Services won't try to up-sell you for the sake of profit. It's understood that every business is different, and sometimes a simple approach to information security is better.&nbsp;</div><div><br/></div><div>Please reach out via phone or email. Let's have a conversation and see if a partnership makes sense for you.&nbsp;</div><div style="text-align:left;"><br/></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 07 Sep 2025 10:54:15 -0600</pubDate></item><item><title><![CDATA[Do you need  a VPN?]]></title><link>https://www.fgmts.com/blogs/post/do-you-need-a-vpn</link><description><![CDATA[VPNs are gaining popularity in the consumer space in recent years. Many people may wonder if a VPN is now a necessity. You might be surprised to see our recommendation.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_jAd4sV3iREW6zQsGDDxkcw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_TIrDJBoiSNOqJd2RCAVu5A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_btB1QjHmSW-1S0wXi688_A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Y8G2sRWAR6mMbj3KyAxs8w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;">It seems that there are VPN advertisements or commercials everywhere now. Each one of them seems to promise similar things: data security, privacy, safety, and more. They also seem to include unsettling or scary information about data breaches, identify theft, and more. I would guess that you have seen at least one of these ads recently, and they have likely made you wonder if you need a VPN.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">I'm here to tell you that you probably don't need a VPN.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">What is a VPN?&nbsp;</span><br/>In it's simplest form, a VPN encrypts and re-routes your internet connection through another server (which is hosted by the VPN provider). The purpose of this is to add an extra layer of encryption and privacy as you interact with the internet.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">VPNs are most commonly used by companies to restrict access to resources, connect secure networks between office sites/locations, and segment their networks. However, VPNs have gained popularity for consumers in recent years, as consumer focus on privacy has increased.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">What are the benefits?</span></p><p style="text-align:left;">Some of the main benefits of a VPN include:&nbsp;</p><ul><li style="text-align:left;">Ensuring all internet traffic is encrypted.</li><li style="text-align:left;">Making it harder to track online activity.&nbsp;</li><li style="text-align:left;">Routing traffic through another location or geography.</li><li style="text-align:left;">Securely connecting remote resources together.</li></ul><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">That sounds great, do I need one?&nbsp;</span></p><p style="text-align:left;">VPNs undoubtedly provide security and privacy benefits. However, it is important to weigh the benefits against the cost. A good VPN service will cost money. It will also require some setup and configuration to operate properly.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">It's also important to remember that VPNs do not protect you from all cyber risks. Additionally, a VPN will not make you fully anonymous when online. For example, the VPN provider will have access to your website traffic, and sites like Facebook, TikTok, etc. can still monitor and track you if you login to them.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">In reality, there are other, more affordable options that can better improve your online security. These include:&nbsp;</p><ul><li style="text-align:left;">Enabling multi-factor authentication (<a href="https://www.fgmts.com/blogs/post/one-thing-that-improves-online-account-security-by-99" title="read more" target="_blank" rel="" style="text-decoration-line:underline;">read more</a>).</li><li style="text-align:left;">Only accessing sites using HTTPS.&nbsp;</li><li style="text-align:left;">Using anti-virus and anti-malware software.</li></ul><div style="text-align:left;"><br/></div><div style="text-align:left;"><div>If you're still not sure, or if you'd just like to talk through your concerns and options, please <a href="/contact" title="contact us" target="_blank" rel="" style="text-decoration-line:underline;">contact</a>&nbsp;FGM Technology Services. Let's have a good conversation about information security best practices!&nbsp;</div><div><br/></div><div><span style="font-weight:bold;">Further Reading</span></div><div><ul><li><a href="https://www.cnet.com/tech/services-and-software/dont-fall-for-these-7-vpn-myths/" title="Don't Fall for These 7 VPN Myths" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Don't Fall for These 7 VPN Myths</a>&nbsp;(CNET)</li><li><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/common-vpn-myths-debunked" title="Common VPN Myths Debunked" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Common VPN Myths Debunked</a> (Bitdefender)</li></ul></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 07 Aug 2025 06:00:00 -0600</pubDate></item><item><title><![CDATA[Why your WiFi is slow, and what you can do to fix it]]></title><link>https://www.fgmts.com/blogs/post/why-your-wifi-is-slow-and-what-you-can-do-to-fix-it</link><description><![CDATA[Frustrated by your home or office WiFi network? Here are some of the most common problems and solutions. When in doubt, contact us for help!]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_oZbLA3KNSQCQMcyTb-PqRA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yn_KNuKrRwWUVq2d3ezt4g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_7U1Hqi6tQrGG5O0CjBfiUg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_9BBrACFJQGaL1AAE_lCmmQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;">Few things are more frustrating than a slow WiFi network. So what can be done to diagnose and fix the issue? Below are some of the most common issues and their solutions. When in doubt, please&nbsp;<a href="/contact" title="contact us" target="_blank" rel="" style="text-decoration-line:underline;">contact</a>&nbsp;FGM Technology Services for a network performance assessment.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">1. Overcrowded network</span></p><p style="text-align:left;">One of the most common issues that can cause poor WiFi performance is too many devices on the network. This often happens slowly over time as more and more devices are connected to the network. The solution to this problem is usually one of the following: 1) disconnect devices from the network (if possible), or 2) upgrade the WiFi router or access points to more powerful models that can handle more devices.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">2. Equipment needs a restart or update</span></p><p style="text-align:left;">Technology equipment is just like any other tool or piece of equipment. Regular maintenance is necessary to keep the equipment running at peak performance. One piece of regular maintenance that often goes overlooked with IT equipment is a good restart. Networking equipment is no different. If your WiFi is performing poorly, it may help to simply restart or unplug/re-plug the equipment.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">However, keep in mind that this should not be necessary more than once per week or so. If you find that you are having to restart your networking equipment more than once per week, there is likely a bigger, underlying problem.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">3. Weak WiFi signal</span></p><p style="text-align:left;">Depending on where you are located in your home or business, the WiFi signal will vary. This is because walls, furniture, and more will interfere with your WiFi signal. Additionally, every WiFi router and access point is different. Some models are more powerful and can produce a stronger signal, while others will have difficulty making it through multiple walls.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">If this is your issue, it is fixable. One option is to try relocating your existing WiFi router or access points. Another option is to purchase and install additional WiFi access points, extenders, etc. to produce a better, broader WiFi signal.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Please keep in mind that WiFi extenders, while convenient, are not always the best tool for this problem. If a WiFi extender is not solving your problem, you may benefit from a professional review of your network. In that case, please <a href="/contact" title="contact us" target="_blank" rel="" style="text-decoration-line:underline;">contact</a>&nbsp;FGM Technology Services for a network performance assessment.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">4. Damaged network cables</span></p><p style="text-align:left;">This is less common, but damaged network cables will cause a serious impact to your WiFi performance. While WiFi is wireless, there will still be network cables providing a critical communication path to your WiFi network. If a network cable is damaged, it will need to be replaced. Please <a href="/contact" title="contact us " target="_blank" rel="" style="text-decoration-line:underline;">contact</a>&nbsp;FGM Technology Services for an assessment and solution to your problem.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">5. Upstream issues</span></p><p style="text-align:left;">Last but not least. It's important to always check the network performance from the source. This is most often a connection to your internet service provider (ISP). If the network performance is poor coming into the home/office network, then the issue will need to be solved at the source. First, it is important to check the incoming network cables for damage. If the cables do not appear to be damaged, then it will likely mean working with your internet service provider (ISP) to find a solution.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Please keep in mind, FGM Technology Services is here to help with any of your home/office network needs. Please <span style="text-decoration-line:underline;"><a href="/contact" title="contact us" target="_blank" rel="">contact</a></span>&nbsp;FGM Technology Services for a discussion and free quote!</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 07 Jul 2025 06:45:58 -0600</pubDate></item><item><title><![CDATA[What to do if your online account was hacked]]></title><link>https://www.fgmts.com/blogs/post/what-to-do-if-your-online-account-was-hacked</link><description><![CDATA[Yes, this is a scary experience. But we can help you work through it.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_U0cQyze5SfatJ43HJvmeYw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_t4VxSnZYQ8CDBR_KRZ3ehg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cOVclSrSSEqJmL83sgLoiA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_eWobfEZzSEin7yK8mFD7sA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;">&quot;Help! My online account was hacked. What should I do?&quot;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">We've all experienced that stomach drop feeling when we realize that something is wrong. When your online account has been hacked or compromised, it can feel like the end of the world. However, now that you know something is wrong, you can act on it. Follow the steps below to get back online, and keep in mind that you can always <a href="/contact" title="contact us" target="_blank" rel="" style="text-decoration-line:underline;">contact</a>&nbsp;FGM Technology Services for questions, guidance, or assistance.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">1. Take a deep breath</span></p><p style="text-align:left;">The first, and most important thing, is to take a deep breath. You're not the first person to experience this problem, and you won't be the last. Panic will probably just make things worse. So take a deep breath, grab a cup of coffee, and let's get to the next step.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">2. Assess the scope of the situation</span></p><p style="text-align:left;">Next, it's important to figure out how much of your account, or accounts, has been impacted. For example, ask yourself the following questions:</p><ul><li style="text-align:left;">How do I know my account has been hacked? If I received a text or notification, can it be trusted?<br/></li><li style="text-align:left;">How many of my accounts have been impacted?&nbsp;</li><li style="text-align:left;">Do I still have access to my account? Or am I locked out?<br/></li></ul><p style="text-align:left;"><br/></p><p style="text-align:left;">Sometimes a notification that you have been hacked is actually the attackers attempting to access your account. For example, imagine that you get a text or a pop up message stating your account has been hacked and that you should urgently call a number. This could be a scam. Calling that number may route you to someone who asks for your password or asks you to download and install something, thus providing them with access to your account or device.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">It's important to take a step back and figure out whether you can trust the source of the notification. When in doubt, look up the actual company phone number and contact them. Or you can always <span style="text-decoration-line:underline;"><a href="/contact" title="contact us" target="_blank" rel="">contact</a></span>&nbsp;FGM Technology Services&nbsp;for assistance.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">3. Reset your password (if you can) and delete any downloaded files/programs</span></p><p style="text-align:left;">If you still have access to your account, then the next step should be to reset your password. This ensures that whoever accessed your account no longer has the correct password. Once this is done, you should be able to move on to the next step.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">If you do not have access to your account, or your locked out, then you should try to use the &quot;forgot my password&quot; option when logging in (if there is one). If that is not available, or it is not working, then you will need to contact the account provider and ask for their assistance.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">After changing your password, it's also a good idea to delete any suspicious files or programs that you may have recently downloaded. This is a precaution to ensure there aren't any malicious files still stored or running on your device. If you still have concerns, please <span style="text-decoration-line:underline;"><a href="/contact" title="contact us" target="_blank" rel="">contact</a></span>&nbsp;FGM Technology Services for a more thorough review and investigation.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">4. Assess the damage and begin cleanup</span></p><p style="text-align:left;">Once you have changed your password and gained (or regained) access to your account, then the next step is to assess the damage. How much damage was done, or could have been done? Once you have thought about it, it's time to begin reverting or cleaning up after the attackers.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">For example, if your social media account was hacked, then you should review and delete any recent posts or messages that the attackers may have sent. It is also recommended to notify your online friends or connections that your account was recently hacked, so they can be extra cautious of any suspicious messages they may have received (or will receive).&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">If your hacked account involved or contained any financial information, then you should contact your financial institutions to notify them of the situation. This will ensure that your financial institutions are aware and can help protect you, as necessary.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">5. Improve your online account security</span></p><p style="text-align:left;">Finally, now that you have resolved the immediate concern, it is important to think about what happened and how you can better protect yourself in the future. For example, the following actions can all help reduce the chances of having your account hacked or compromised:&nbsp;</p><ul><li style="text-align:left;">Enable multi-factor authentication on your accounts (<a href="https://www.fgmts.com/blogs/post/one-thing-that-improves-online-account-security-by-99" title="read more" target="_blank" rel="" style="text-decoration-line:underline;">read more</a>).</li><li style="text-align:left;">Closely review the sender of an email before clicking on any links or attachments.</li><li style="text-align:left;">Don't navigate to suspicious websites or open suspicious links, attachments, or files.</li><li style="text-align:left;">Use a different password for each online account.</li><li style="text-align:left;">Enable security notifications on your accounts, where possible.</li></ul><p style="text-align:left;"><br/></p><p style="text-align:left;">When in doubt, please <a href="/contact" title="contact us" target="_blank" rel="" style="text-decoration-line:underline;">contact</a>&nbsp;FGM Technology Services. Let's get you a customized quote and address your questions, concerns, or issues.</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 30 Jun 2025 21:15:31 -0600</pubDate></item><item><title><![CDATA[One change that will improve online account security by 99%]]></title><link>https://www.fgmts.com/blogs/post/one-thing-that-improves-online-account-security-by-99</link><description><![CDATA[Do this one thing, and you can feel a lot better about the security of your online accounts and data.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_VXsvUfzfR7KrVxcNA10IvQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_YiKAZRESSZ2onQzPZpIIjw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_LlR9bZtLTly3zJfA8eGOLQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Ilw5znoCTRWQFwXHEUHC2g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p style="text-align:left;">What is the most important change that can be made to secure online accounts? The short answer is multi-factor authentication (MFA).&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Online account security can seem overwhelming, especially when you're not sure who to trust. While security is a complex topic, multi-factor authentication is one change that will have a profound impact on online account security. In fact, <a href="https://www.microsoft.com/en-us/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Microsoft states that enabling multi-factor authentication will prevent 99.9% of attacks on accounts</a>.&nbsp;</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">What is multi-factor authentication?&nbsp;</span></p><p style="text-align:left;">Multi-factor authentication, also known as two-factor authentication (2FA), is a process in which two or more verification methods are needed to login to an account. For example, someone using MFA might need to do the following to login to their account:&nbsp;</p><ol><li style="text-align:left;">Type in their password.</li><li style="text-align:left;">Type in a code that was sent to their phone number, email, or authenticator app.</li></ol><div style="text-align:left;"><br/></div><div style="text-align:left;">When using MFA, a password by itself will not grant access to an account. While the additional step may seem cumbersome, it vastly improves the security of an account. Even if an attacker has an account password, they will not be able to access the account unless they can also compromise the other verification methods.</div><div style="text-align:left;"><br/></div><div style="text-align:left;"><span style="font-weight:bold;">How to turn on multi-factor authentication</span></div><div style="text-align:left;">Every application and system is different. However, the steps to turn on MFA are usually similar. If an account provider or system offers MFA as a security option, it can usually be found under account settings. Below are some helpful resources for popular applications and systems:</div><div style="text-align:left;"><ul><li><a href="https://www.facebook.com/help/148233965247823" title="How two-factor authentication works on Facebook" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">How two-factor authentication works on Facebook</a>&nbsp;(facebook.com)</li><li><a href="https://support.google.com/accounts/answer/185839?hl=en&amp;co=GENIE.Platform%3DDesktop" title="Turn on 2-Step Verification" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Turn on 2-Step Verification</a>&nbsp;(google.com)<br/></li><li><a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=G3PWZPU52FKN7PW4" title="What is Two-Step Verification?" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">What is Two-Step Verification?</a> (amazon.com)<br/></li></ul></div><div style="text-align:left;"><br/></div><div style="text-align:left;"><span style="font-weight:bold;">Still have questions?</span></div><div style="text-align:left;"><div>For any other questions or concerns, please feel free to <a href="/contact" title="contact FGM Technology Services" rel="" style="text-decoration-line:underline;">contact FGM Technology Services</a> for assistance. You'll be happy you did!&nbsp;</div></div><p style="text-align:left;"><br/></p><p style="text-align:left;"><span style="font-weight:bold;">Further reading:&nbsp;</span></p><ul><li style="text-align:left;"><a href="https://www.microsoft.com/en-us/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/" title="One simple action you can take to prevent 99.9 percent of attacks on your accounts" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">One simple action you can take to prevent 99.9 percent of attacks on your accounts</a>&nbsp;(microsoft.com)</li><li style="text-align:left;"><a href="https://www.onelogin.com/learn/what-is-mfa" title="What is Multi-Factor Authentication (MFA) and How Does it Work?" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">What is Multi-Factor Authentication (MFA) and How Does it Work?</a>&nbsp;(onelogin.com)<br/></li></ul></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 22 Jun 2025 09:00:00 -0600</pubDate></item></channel></rss>