An Inside Job: The Real Threat to Your Business Network’s Security

By webdev | August 10th, 2017 | Backup & Disaster Recovery Network Infrastructure

Today, the number of types of cyber-attacks which threaten the security of your businesses are endless.  We’ve discussed the greatest weakness in network security being users before, but the focus was in a non-acting participant being coerced into clicking on a malicious link or opening a dangerous attachment. We often focus so much attention to … Continued

Identifying Tech Support Fraud

By Roger Murray | November 7th, 2016 | Network Security

We’ve all received unsolicited calls before, most offering complimentary services or attempting to sell a product.  However, a growing trend in gaining access to an otherwise secure network involves deceiving a caller into divulging pertinent information, or worse, control of their computer to install malware. How It Works:  This alternate approach with initiating a hack by … Continued

Lessons from the Recent DDoS Attack

By Roger Murray | November 2nd, 2016 | Network Security

Last month, huge parts of our internet essentially shut down; from Amazon, Twitter, and Spotify, to Netflix and Reddit.  One of the biggest takeaways from the attack is the realization of just how susceptible our fragile internet truly is.  The graph below shows just how quickly and to what extent the United States’ internet was … Continued

Understanding Security Assessments

By Roger Murray | October 26th, 2016 | Network Security

It may come as of little surprise that security breaches hurt small business much more than larger corporations. According to the National Cyber Security Alliance, more than 70% of attacks target small businesses.  It is also estimated that 60% of hacked small businesses experience devastating economic hardship, leading many to suffer a complete loss, closing … Continued

Understanding Information Technology Assessments

By Gerard Louise | October 24th, 2016 | Network Security

The term Information Technology (IT) Assessment is often convoluted because it is so often portrayed as the simple and easy process of scanning an organization’s existing network.  However, this could not be further from the truth.  It is important to remember that a formal Technology Assessment is not a Technology Audit.   The use of terminology … Continued

Lost & Found: The Dangers of Mystery USB Drives

By Kenneth Sprague | October 3rd, 2016 | Network Security

So if you found a USB Stick in the parking lot this morning, what would you do?  What if you found one in the course of your job, in a rental car, or in a “Lost & Found” box in your office?  You would be curious to see what is on the drive or inclined … Continued

What to do during a Ransomware Attack?

By Roger Murray | September 28th, 2016 | Network Security

The topic of Ransomware is a steadily increasing mainstream topic affecting both small and large businesses alike.  We’ve discussed some of these common types of intrusions before, this type of malware encrypts your data and holds it for ransom to receive the key, it requires a fast acting user in order to minimize the amount … Continued

Outsourcing Backup, Disaster Recovery, & Other IT Services

By Roger Murray | September 20th, 2016 | Managed Services

There is a considerable amount of time and capital invested by business owners into their information technology (IT) infrastructures; it is often recognized as a vital component and foundation to the future success of an organization. Many hire outside IT service providers and specialists to either supplement their existing IT, or act as a business … Continued

Tech Essentials: Back to School Guide

By Roger Murray | September 13th, 2016 | Business Operations

It’s that time of year again! From elementary through college, the school year has officially begun.  What does this mean?  That it’s time to get the latest tech to make the daily hustle of class infinitely better. However, sifting through the mountain of options available in the marketplace to determine which is worthy of your … Continued

An IT Director’s Best Practices for E-Mail Security

By Brian Downey | September 8th, 2016 | Network Security

E-Mail is one of the most commonly used applications in the world.  It provides organizations with a quick and cost effective means to communicate and, from inception, it quickly became a necessity most businesses could not live without.  However, hackers are keenly aware of this fact as well and continuously devise new creative ways to … Continued

Need Support? Call Us Today

Avaliable 24 hours a day, 7 days a week
1-508-543-6979