Get up to speed on today’s hot-button IT issues!

Check out our blog entries for up-to the minute information and advice regarding some of the most urgent topics we’ve covered.

5 Tips to Maximize the Benefits of Cyber Liability Insurance

Changes in costs and consumer demands in the past decade have accelerated the adoption of cloud-based infrastructure. Over 80% of small businesses  now declare cloud computing important to their business, ...
Disaster recovery plan button

3 Growing Trends for Disaster Recovery and Business Continuity Plans

Murphy's Law may not be scientific, but the spirit of the concept is more than a meme. Disruptive events like the COVID-19 pandemic and the 2007-2009 Great Recession prove every ...

CyberSecurity Primer for the Small to Mid-Sized Business

Small and midsize businesses face an increasingly complex digital landscape. On the one hand, cloud-based operations are almost unavoidable. Considering 40% of consumers start their search online, operating without a ...

Microsoft Hack: What You Need to Do Right Now

A recent cyberattack on Microsoft Exchange Server is believed to have impacted as many as 250,000 email servers covering nearly all business segments and sizes. If you have Microsoft Exchange ...

Leaders: Ask Yourself These Questions to Assess Your Data Breach Risk

Another day, another data breach. We have already seen several major ones during the first month of 2021. A database maintained by an online photo editing app containing 1.9 million ...
payment processing setup at retail store

6 Steps to Shield your Payment Processing Setups from Online Dangers

Existing payment trends make one thing clear: Cash is on its way out. A 2020 Worldpay, Inc. study predicts that point-of-sale (POS) cash payments will drop from 30.2% of sales ...
hacker in the shadows behind computer code

Remote Control: Cyber Threats to Working From Home During COVID-19

More people than ever are currently working remotely because of COVID-19. While such arrangements have been on the rise the past few years, the pandemic has spurred a mass migration ...
man working on laptop on park bench with lock icons on screen

Telecommuting Cybersecurity: Protect Your Network from Threats

With large masses of people transitioning to work-at-home arrangements, some employers are scrambling to establish remote IT setups. Unfortunately, this often results in rushed arrangements that neglect important security protocols. ...
hand grabbing at floating symbols of online content

Content Filtering: Why Appearances Can Be Deceiving

It’s another Monday, and you look over your office of busy employees hard at work on their computers. While it might seem like a productive scene, however, appearances can be ...
small business

Size Doesn’t Matter: Why Your Small Business is a Cybercrime Target

In a world of rampant cybercrime, hackers thrive on the blind faith of their targets. Despite high-profile digital security breaches in the news nearly every week, most people assume their ...
IT investments

3 IT Investments You Should Never Skimp On

There’s a disturbing trend underlying the business world’s increased reliance on technology. It’s true that the internet age has empowered companies of all sizes to do incredible things and that ...
password guidelines

Don’t Take a Pass on Secure Password Guidelines

Today almost everything you do—and almost all information about you—is on a computer or a website connected to the internet. And nearly all businesses, from your doctor’s office to your ...

Reviving a Network Ravaged by Ransomware: A Case Study

With ransomware on the rise, it’s critical to have an experienced, knowledgeable provider that keeps up with the latest on this ever-increasing threat. Check out this recent case study to ...
ransomware damage

Five Ways to Mitigate Ransomware Damage

Lost files, denied access, ransom payments in the $100,000 range or higher… With the impact that hackers can have on your network and your business, we have always stressed the ...
technology budget

Leverage Your Technology Budget Surplus

As the end of the fiscal year approaches for many businesses and organizations, managers often comb through their budgets in search of unused funds. Your technology budget should no exception. ...

Important Information Regarding Hurricane Dorian

Hurricane Dorian is expected to skirt the east coast of Florida on Wednesday, September 4 as a major Category 3 hurricane. From there, the storm is predicted to travel north ...
storm

Are You Prepared? A Storm Prep Checklist to Protect Your Network

While we’re halfway through a (thankfully) quiet Atlantic hurricane season, that’s no reason to let your guard down. Not only are we approaching the peak of the season, there are ...
data recovery

Fast, Pain-Free Data Recovery: Do You Have the Right Elements in Place?

There are three critical elements you must have in place to quickly recover your data and IT system in the event of disaster. Yet did you know that most businesses ...
cloud computing

Cloud Computing: The Good, The Bad & The Ugly

Cloud computing has great advantages, but its vulnerabilities can affect even the biggest tech names. When a network of internet of things (IoT) gadgets like routers, DVR machines and closed-circuit ...
hurricane planning for your tech

Protect Your Tech! Start Your Disaster Preparation Now

Many businesses were impacted by the hurricanes of recent years. Those that ultimately recovered had one thing in common—they were prepared ahead of time. While we can’t prevent or anticipate ...
email

4 Emails You Should NEVER Open

No matter how “bomb-proof” we make your network, you and your employees can still invite a hacker in if you click on a link or open an attachment in an ...
electricity

The 4 Hidden Dangers of Electricity on Your IT Network

Is your computer plugged in? Do you use a power strip with a surge protector? If so, you are a heartbeat away from disaster and don’t even realize it. Believe ...
cloud solutions

4 Must-Have, Low-Risk Cloud Solutions

Let’s face it—your business has more competition than ever. And they’ll eat you alive if you fall behind in today’s technology arms race. Maybe your network needs greater security. Or ...

10 Warning Signs of Impending Computer Disaster… And How to Prevent Them

The old saying that “an ounce of prevention is worth a pound of cure” is especially true in the world of technology. Computers rarely stop working overnight; in most cases, ...

Think Your Business is Too Small to be Hacked? Think Again.

Despite high-profile digital security breaches showing up in the news nearly every week, most people assume they’re safe from attack. The thinking goes that while Fortune 500 corporations like J.P. ...
Man in black hooded sweatshirt with mask hacking a computer

Tax Season = Phishing Season

As you prepare your 2017 tax return, you’ll likely use email to send personal information to your accountants or other financial professionals. But as you sort through your inbox, can ...
man in grey hoodie sitting in darkness on the computer

4 Things You Must Do To Protect Your Organization From Identity Theft

While it’s impossible to plan for every potential scenario, a little proactive planning and proper network precautions will help you avoid or greatly reduce the impact of the vast majority ...
man in grey suit facing white hologram chart

You’re Ready for Irma… But What About Your IT Network?

You’re ready for Hurricane Irma… but how about your business technology? It’s not too late to protect your computers and data from the impending storm. Here are some quick steps ...
man holding lock icon

10 Biggest Myths of HIPAA Risk Assessments

We’ve heard the stories about electronic protected health information (ePHI) being misused or released to the public. But did you know that mere lack of protection itself can put you ...
ransomware skull key icon

Ransomware: Education is Your Best Defense

You sit down at your desk, log on to your computer… and are greeted with a brazen message: YOUR COMPUTER AND FILES ARE ENCRYPTED. YOU HAVE 96 HOURS TO SUBMIT ...
blue hallway with icons on walls and man in suit at the end

BrickerBot: Putting Security and Convenience at Risk

Technology makes it easier than ever to monitor your business when you’re not around. You can view live video feeds from surveillance cameras, set your building’s internal temperature, even turn ...
blue backup key on computer keyboard

Demand the Best from Your Remote Backup Service

Congratulations – you’ve made the wise choice of backing your data up to a secure off-site facility! But how do you choose the right firm to perform this very important ...
magnifying glass on red broken lock

The Yahoo Data Breach: Are You At Risk?

It has recently been discovered that the Yahoo network was compromised back in 2014, resulting in the breach of over 500 million user accounts. If you have a have a ...
fingers clicking on white lock icon

Facebook Privacy Considerations

Facebook’s algorithms to suggest friendships often bring to light convoluted yet amusing coincidences. You might see an acquaintance from high school reach out to a colleague at your workplace, or ...
woman holding tablet with icons coming out of it

Will Your Backups Be There When You Need Them?

When the livelihood of your organization depends on data stored in your computer network, you simply cannot afford to leave anything to chance. Data preservation and the ability to retrieve ...
purple coding and technology icon

Web Content Filtering, Your Luckiest Move of the Year

Do your employees bring their own smartphones, tablets or laptops to work? If your company is like most these days, they do. And that raises a whole new security risk ...
woman holding technology keywords

Technology Quick Fixes to Help Improve Your Business’ Productivity

Thank you for joining me for the second part of our technology business planning series.  Last month we focused on the user experience and how planning to upgrade those components ...
knob switching from problems to solutions

5 Simple Technology Solutions to Help Ensure Your Workplace Gets the Biggest Bang for its Buck

We know that technology should help us perform more efficiently. But, how often do you wait until a hardware or software failure forces you to reevaluate the right tools for you ...
gold lock on computer keyboard

Security Best Practices Check-List

Do You Have the Right Technology to Maintain Privacy & Minimize Data Breaches? Do you collect and maintain sensitive information (e.g. name, address, DOB, SSN, credit card or bank account information, ...