Shantae' Hansen
Filter by
Blog
|
3 min read
How to Spot a Phishing Attempt and Steps You Can Take
What do I mean? Regardless of where your organization is in its cybersecurity journey, one thing continues to be abundan...
Read More
Blog
|
4 min read
Breaking Down a Sophisticated Phishing Email: 4 Advanced Warning Signs
Weve often talked about the warning signs of phishing and how to dissect phishing emails. However, phishing emails grow...
Read More
Blog
|
4 min read
Cloud Computing and Its Services
Cloud computing services have revolutionized the way that businesses manage their IT systems. The three main types of cl...
Read More
Blog
|
1 min read
Cybersecurity Alert - Increase in Unemployment Fraud
According to the FBI and VC3s own experience, there is an increase in attempts by bad actors to fraudulently claim unem...
Read More
Blog
|
6 min read
Virtual City Hall: How to Digitize Your Paper Forms in 5 Steps
In this time of social distancing, everyone is rethinking how to provide services. Digitizing forms, online permitting, ...
Read More
Blog
|
5 min read
Bringing IT into Focus: Is Your IT Working for You or Against You?
Think back to your elementary school days. Perhaps you were one of the lucky kids who wore glasses. Do you remember what...
Read More