Even though technology can provide some incredible returns on your investment, many businesses struggle with managing and maintaining it properly. Small businesses in particular have more restrictions placed on them compared to major enterprises, especially in regards to budget, workforce, or workspace. How can small businesses stay competitive against companies that have so many more resources available to them? Managed... Read More
- Published: 31 May 2021
The recent hack of Colonial Pipeline has led to no shortage of problems, chief among them gasoline shortages all across the east coast of the United States. The pipeline’s operations may have been restored, but the question still remains: what could have been done to stop it, what can we learn from this incident, and
- Published: 19 Apr 2021
Ransomware attacks are notorious for their expense to the victim—largely because of the various costs that come along with successful ransomware infections, including many that might not be expected at first. Let’s review some of these costs, if only to reinforce the importance of avoiding ransomware as a rule.
- Published: 15 Mar 2021
When most of us think of cybercrime, we’re thinking about a lone hacker in a dimly lit room—or, at most, a few hackers hunched over their computers in a dimly lit room. However, to remain restricted to this impression would be inaccurate—particularly when you consider the very real threat that state-sponsored cyberattacks can just as
- Published: 01 Jan 2021
2020 has brought us a lot of news that we’d rather not hear. Just days before the end of what may be regarded as one of the worst years on record, there is more. One of the largest hacks in the history of the Internet happened earlier this year and more is being learned about
- Published: 12 Oct 2020
Wouldn’t it be nice to know how much risk your business was under, in terms of vulnerabilities and potential exploits? Believe it or not, this is entirely possible, through a process known as penetration testing. Commonly referred to as “pen testing,” this simple measure can provide a business with some very valuable insight into their
- Published: 10 Jul 2020
Your business’ wireless is an important factor to consider in your operations, which means that your choice of router is crucial for your overall success. Here, we’re going into a few considerations that you should keep in mind as you select your router.
- Published: 06 Jul 2020
It’s a common myth that Apple computers don’t get viruses. It’s not uncommon for a Mac user to chime in and say, “you should have gotten a Mac,” when a PC user mentions getting a virus or malware. Let’s unpack this myth, and talk a little about how, no matter what technology you have, you
- Published: 04 May 2020
With remote work becoming a popular option amongst businesses nowadays, concerns and considerations should be raised about how secure the networks being used are: namely, the Wi-Fi connections many have in their homes. Just as in the office, it is important that these networks are properly secured for the good of your business.
- Published: 25 Mar 2020
While every aspect of your organization’s security is incredibly important to attend to, we wanted to take the time and delve into a particular aspect that many might take for granted: your digital access controls. Let’s go over a few tips and practices to ensure your access controls and policies are optimized.
- Published: 16 Mar 2020
Ever since it first popped up in the Wuhan Province of China, COVID-19 (better known as the coronavirus) has created quite a stir—bordering on panic—around the world. Unfortunately, as has been the case many times before, cybercriminals have been using this near panic to support their attacks. Let’s review some of the ways they do