Wash Your Hands of Poor Cyber Hygiene

We are all taking the time to wash our hands thoroughly, wear masks, and practice social distancing to protect ourselves. And although it is important for us to maintain our physical hygiene to protect ourselves from COVID-19, it is also important to maintain good cyber hygiene so we can protect ourselves from cyber [...]

By |2020-10-14T14:59:54-04:00October 14th, 2020|Security|0 Comments

The Hard Facts on Cyber Attacks

If you were asked to name 10 types of cyber attacks we could reasonably assume the top 2 might be Ransomware & Email Phishing. These are the types of attacks we most frequently hear about in the media. What about the next 8 though? Can you even name 8 more?   Unless you’ve researched in detail the types [...]

By |2020-10-14T10:27:34-04:00May 27th, 2020|Business, IT Support, Security|Comments Off on The Hard Facts on Cyber Attacks

Stay Ahead of Threats: The Top 5 Cybersecurity Risks

...and what it could cost you! The cyber-threat landscape is constantly shifting and evolving. Because of the wide variety of digital threats, there is no cookie cutter solutions when it comes to protecting your business from a data breach. A comprehensive security strategy is required, complete with several layers of protection [...]

By |2020-08-11T03:45:24-04:00February 11th, 2020|Security|Comments Off on Stay Ahead of Threats: The Top 5 Cybersecurity Risks

4 Technology Traps Small Businesses Fall Into

In the technological world we live in today, a single mistake can lead to catastrophic data loss. Too often, small businesses find themselves in a serious bind from simple technology oversights. When managing a small business, it’s crucial to establish your competitive advantage. Technology is designed to provide that advantage on many levels for [...]

By |2020-07-08T23:34:14-04:00October 25th, 2019|Business, IT Support, Managed Services, Security, SMB|Comments Off on 4 Technology Traps Small Businesses Fall Into

Want to Know Which Employees Would Fall for a Phishing Scam?

All hackers need is for a single user to take the bait off their phishing scam hook. Cyber-criminals are constantly crafting new methods to steal data and compromise security. Phishing scams are one of the most damaging of these methods, and they depend on human error. Clicking a malicious link or opening a bad [...]

By |2020-10-07T19:52:48-04:00August 8th, 2018|Security, Business, IT Support|Comments Off on Want to Know Which Employees Would Fall for a Phishing Scam?

4 Employee Errors that Cause Security Breaches

Employee errors are the leading cause of security breaches within organizations. People are unpredictable, careless, and just plain ignorant when it comes to protecting confidential company data. As technology grows more complex, the risk of error increases with it, leaving your business susceptible to hackers and other security threats.Employers must work harder to stop [...]

By |2020-08-10T04:51:05-04:00July 25th, 2018|Security, Business, IT Support, SMB|Comments Off on 4 Employee Errors that Cause Security Breaches

5 Ways to Keep Your Information Off the Dark Web

In the last year, you've probably heard nightmares of the dark web and the illegal activities that take place on it. Unfortunately, this is no exaggeration. The dark web is a perilous place where hackers can buy and sell your personal information, like social security numbers, health records, and credit card numbers. What Is the [...]

By |2020-08-10T03:35:35-04:00May 15th, 2018|Security, Business, Enterprise, IT Support|Comments Off on 5 Ways to Keep Your Information Off the Dark Web

How the GDPR Will Affect US Businesses

For nearly a year, everyone has heard about the European Union's General Data Protection Regulation and how it's going to change the way data is collected and protected. Before the May 25th deadline approaches, businesses in the US need to know whether they must comply with GDPR requirements.What Is the GDPR?The European Union (EU) created [...]

By |2020-08-10T02:35:10-04:00March 27th, 2018|Security, Business, Collaboration, Enterprise|Comments Off on How the GDPR Will Affect US Businesses

Reduce Security Breaches with an Internet Usage Policy (IUP)

Why Does Your Organization Need an Internet Usage Policy? Just like many things in life, the Internet is both good and bad. It's great for generating business and getting the job done. But for those who are careless or misuse it, the Internet can be a very, very dangerous tool. To make matters worse, [...]

By |2020-08-10T01:22:43-04:00February 27th, 2018|IT Projects, Business, Collaboration, Security|Comments Off on Reduce Security Breaches with an Internet Usage Policy (IUP)

Before You Put That Security System App on Your Phone, Read This!

A cool and innovative feature that is being offered to our clients by their security companies is connecting their security system to an app on key persons’ phones. This sounds great, and is admittedly a useful feature. However, there are huge security risks that must be mitigated before this feature is implemented. Background on [...]

By |2020-06-09T01:37:43-04:00December 6th, 2017|IT Projects, Business, Security|Comments Off on Before You Put That Security System App on Your Phone, Read This!
Go to Top