Category: Blog

Experts Have Warned Us that a New Wave of Cyber Attacks have Started Aimed at Remote Workers

Security Concerns for Remote Workers As droves of Americans start to work from home, hackers are taking notice. Experts have already warned us over the past few weeks that a new wave of cyber-attacks have started, aimed at workers outside of relatively secure office environments. Larger organizations may have established work-from-home practices and infrastructure already… [Read More]

How Microsoft Teams Keeps Companies Running Remotely

With our sudden shift to remote working, it’s important to get all employees on a single communication platform. It’s incredibly inefficient if everyone is using different apps and services – now is the time to consolidate on an agreed-upon platform. At Ntiva we use Microsoft Office 365, and so Microsoft Teams is our go-to collaboration… [Read More]

How Are CEOs Responding To The Coronavirus Impact?

As the coronavirus pandemic continues to escalate, CEO’s are quickly coming to grips with the fact that business will be anything but normal for the next few quarters. According to a global survey released on Tuesday from the Young President’s Organization (YPO) 82% of business leaders expect declines in revenue over the next six months. Note that… [Read More]

How SMBs Can Benefit from a Comprehensive Security Service

For a small business, the threat of a cyberattack can feel far away. The high-profile breaches have targeted larger companies, so small businesses may be tempted to think they’re not attracting threat actors’ attention. But the reality is that 43 percent of cyberattacks are aimed at SMBs, with the number of attacks up nearly 425 percent in 2018… [Read More]

What’s a guest Wi-Fi network, and why do you need one?

The modern world is so hooked up to online services that when guests come around, “How ya doing?” will probably be followed by “What’s your Wi-Fi password?” But the hospitable host probably doesn’t realize that revealing this information could pose a network security risk. For example, guests might accidentally download a malicious program or connect… [Read More]

ACCi Gives Back to the Community

We are excited to be involved in our community and making a difference in young lives!  This year, ACCi is sponsoring a U12 Travel Team.  NorthStar ministry has an annual banquet each year to showcase their efforts, and ACCi will be sponsoring a table.  The banquet is being held on Thursday, November 14th in Homewood…. [Read More]

How to Make Your Company Culture More Cyber Aware

The biggest problem companies face when it comes to cybersecurity is often not the technology; it’s the people.  And hackers (often called “bad actors”) know this. That’s why it takes more than strong IT to keep your company safe. It “takes a village.” Beyond technology, the best way to protect your business from cybercriminals is with a… [Read More]

What is the Alabama Breach Notification:

Application. A person or commercial entity (collectively, Entity) that acquires or uses sensitive personally identifying information. Security Breach Definition. The unauthorized acquisition of data in electronic form containing sensitive personally identifying information. Good-faith acquisition of sensitive personally identifying information by an employee or agent of an Entity is not a security breach, provided that the information is… [Read More]