Category: Blog

Plan for Change

For your company to survive, let alone thrive, you need to be able to adapt to change. Your technology and your IT provider must be more than just up-to-date, but also, they must be versatile to prepare and react to change, especially unwelcomed change. Positive and negative change always happens with technology. As new technology… [Read More]

What is NIST and Why Small Business Owners Should Care

To begin, NIST is the National Institute of Standards and Technology. NIST is a non-regulatory federal agency that was founded in 1901 and it is under the Department of Commerce. Their mission is to promote U.S. innovation and industrial competitiveness. They achieve this by advancing measurement science, standards and technology in ways that enhance economic… [Read More]

Tips for Preventing Fraud in Your Small Business

As a small business owner, fraud prevention may be at the bottom of the barrel when it comes to your actionable priorities. It should, however, be at the top. The ACFE, or Association of Certified Fraud Examiners, reported that in 2016, organizations with fewer than 100 employees experienced a median fraud loss of $150,000. Imagine that… [Read More]

DNS Filtering and Your Business

As cybercriminals and hackers continue to grow in numbers and expand their capabilities to infiltrate your network, your business must continue to leverage more resources to tighten your processes. The key for today’s cyber security dangers is for IT professionals and their executives to ensure the organization is using a “multi-layer” approach. A multi-layer approach… [Read More]

Business Email Compromise (BEC) Now A $12.5 Billion Scam

Email continues to be the top vector used by cybercriminals, and business email compromise (BEC) is gaining traction as one of the preferred types of email attacks. BEC attacks do not contain any malware and can easily bypass traditional email security solutions. For cybercriminals, there is no need to invest in highly sophisticated and evasive… [Read More]

Inside the Modern Phishing Campaigns of 2019

by Ganesh Umapathy, SonicWall The world of cybersecurity is dominated by headlines of malware, ransomware, data breaches, app vulnerabilities, IoT threats and botnet attacks. But phishing has been a serious threat since the early 2000s and is widely regarded as the most common attack vector for cybercriminals. Today, phishing is not about volume. These email threats are now… [Read More]

10 Ways to Secure Your Smartphone Against Hackers

by: Jackie Dove Small businesses are keenly aware that protecting their assets is a top priority. Today, a major part of security strategy is ensuring that your smartphone can avoid or shut down hackers. Businesses have come to rely on smartphones for a range of commercial operations: inventory control, customer relations, advertising and marketing, banking… [Read More]

5 Cyber-attack Vectors for MSSP to Mitigate in Healthcare

by: Joe Velderman It’s no secret that healthcare continues to be one of the most targeted industries for cybercriminals. Healthcare providers store and maintain some of the most valuable data and the appetite for fraudulent claims or fake prescription medications is insatiable. Despite all of the regulations, there are still fewer watchdogs overseeing healthcare. For… [Read More]

Windows 7 is Approaching End-of-Life

If you’re reading this on a computer that’s currently running Windows 7, I have some bad news: the End-of-Life date for this version is approaching. What does this mean for your business and the workstations that support it? Read on to find out. End-of-Life? Don’t worry, this doesn’t mean that your computers are suddenly going… [Read More]

Windows 7 End of Life

Please do not wait until year end!  We are encouraging all of our clients to be proactive in evaluating their IT infrastructure and scheduling their required upgrades this summer or fall and not waiting until the end of the year (December) when it will be a mad scramble. Windows 7 and Windows Server and 2008… [Read More]