Get up to speed on today’s hot-button IT issues!

Check out our blog entries for up-to the minute information and advice regarding some of the most urgent topics we’ve covered.

An IT professional is examining servers is a warehouse and taking notes on his clip board.

How to Protect Donor Data from Prying Eyes

Donors trust your nonprofit not only with their money, but with their personal information as well. One way your organization can honor that trust is to ensure you protect donor ...
A customer is purchasing a cup of coffee with bitcoin using their sell phone. The cell phone is shown pointing toward the vendor and has the bitcoion logo on the phone screen.

Should Your Business Accept Bitcoin Payments?

The payments ecosystem is complicated enough as it is. Throw in the growing prevalence of Bitcoin and other cryptocurrencies and you can’t fault business owners for feeling anxious. Nevertheless, businesses ...
A person is holding a mobile phone, but only the phone and the person's hands are visible in the image. There is a chatbot shown on the phone screen. The background is blurred and shows a table, chairs, and a cup of coffee.

Can Hackers Get Through Your Customer Service Chatbots?

Chatbots are some of the best AI-infused applications businesses can utilize. Depending on the size of your operation, you could save tens of thousands of dollars per year in customer ...
A business worker is getting instructions from another businessman, in a computer lab while standing over his shoulder. The man giving instructions is sitting and pointing at the computer screen while instructing.

New Florida Law Requires Tougher Government Cybersecurity Standards

A new Florida law prohibits state agencies and local governments from paying ransomware demands. It also requires annual employee cybersecurity training and other protective measures to secure their technology. House ...
A cybersecurity expert working on computer systems at the desk.

Preventing a Cyberattack at Your Business

Another year, another slew of cyberattacks in the news — and 2021 was a doozy. According to Check Point, there was a 50% increase in attacks per week on corporate ...
A keyboard with a padlock sitting on top of it.

5 Tips to Maximize the Benefits of Cyber Liability Insurance

Changes in costs and consumer demands in the past decade have accelerated the adoption of cloud-based infrastructure. Over 80% of small businesses  now declare cloud computing important to their business, ...
Disaster recovery plan button

3 Growing Trends for Disaster Recovery and Business Continuity Plans

Murphy's Law may not be scientific, but the spirit of the concept is more than a meme. Disruptive events like the COVID-19 pandemic and the 2007-2009 Great Recession prove every ...
A computer engineer working on a laptop with virtual screen icons in front of him.

CyberSecurity Primer for the Small to Mid-Sized Business

Small and midsize businesses face an increasingly complex digital landscape. On the one hand, cloud-based operations are almost unavoidable. Considering 40% of consumers start their search online, operating without a ...
Hacker working at a laptop being locked out of a system. There is a screen full of locked blue padlocks with one red padlock opened.

Microsoft Hack: What You Need to Do Right Now

A recent cyberattack on Microsoft Exchange Server is believed to have impacted as many as 250,000 email servers covering nearly all business segments and sizes. If you have Microsoft Exchange ...
An individual standing on top of a stool sketching on a blackboard.

Leaders: Ask Yourself These Questions to Assess Your Data Breach Risk

Another day, another data breach. We have already seen several major ones during the first month of 2021. A database maintained by an online photo editing app containing 1.9 million ...
payment processing setup at retail store

6 Steps to Shield your Payment Processing Setups from Online Dangers

Existing payment trends make one thing clear: Cash is on its way out. A 2020 Worldpay, Inc. study predicts that point-of-sale (POS) cash payments will drop from 30.2% of sales ...
hacker in the shadows behind computer code

Remote Control: Cyber Threats to Working From Home During COVID-19

More people than ever are currently working remotely because of COVID-19. While such arrangements have been on the rise the past few years, the pandemic has spurred a mass migration ...
man working on laptop on park bench with lock icons on screen

Telecommuting Cybersecurity: Protect Your Network from Threats

With large masses of people transitioning to work-at-home arrangements, some employers are scrambling to establish remote IT setups. Unfortunately, this often results in rushed arrangements that neglect important security protocols. ...
hand grabbing at floating symbols of online content

Content Filtering: Why Appearances Can Be Deceiving

It’s another Monday, and you look over your office of busy employees hard at work on their computers. While it might seem like a productive scene, however, appearances can be ...
Two coworkers working at a small business

Size Doesn’t Matter: Why Your Small Business is a Cybercrime Target

In a world of rampant cybercrime, hackers thrive on the blind faith of their targets. Despite high-profile digital security breaches in the news nearly every week, most people assume their ...
An icon of a human sitting on a pile of money while working on a laptop.

3 IT Investments You Should Never Skimp On

There’s a disturbing trend underlying the business world’s increased reliance on technology. It’s true that the internet age has empowered companies of all sizes to do incredible things and that ...
A magnifying glass looking at red and blue padlocks on a screen.

Don’t Take a Pass on Secure Password Guidelines

Today almost everything you do—and almost all information about you—is on a computer or a website connected to the internet. And nearly all businesses, from your doctor’s office to your ...
A man dressed as Superman standing in front of server stacks.

Reviving a Network Ravaged by Ransomware: A Case Study

With ransomware on the rise, it’s critical to have an experienced, knowledgeable provider that keeps up with the latest on this ever-increasing threat. Check out this recent case study to ...
A screen displaying ransomware damage to a user.

Five Ways to Mitigate Ransomware Damage

Lost files, denied access, ransom payments in the $100,000 range or higher… With the impact that hackers can have on your network and your business, we have always stressed the ...
White puzzle pieces with a green money symbol on top.

Leverage Your Technology Budget Surplus

As the end of the fiscal year approaches for many businesses and organizations, managers often comb through their budgets in search of unused funds. Your technology budget should no exception. ...
A hurricane forming over the Atlantic Ocean heading to the Florida coast.

Important Information Regarding Hurricane Dorian

Hurricane Dorian is expected to skirt the east coast of Florida on Wednesday, September 4 as a major Category 3 hurricane. From there, the storm is predicted to travel north ...
Storm supply closet with rations and supplies for hurricane preparedness.

Are You Prepared? A Storm Prep Checklist to Protect Your Network

While we’re halfway through a (thankfully) quiet Atlantic hurricane season, that’s no reason to let your guard down. Not only are we approaching the peak of the season, there are ...
Computer keyboard with a data recovery button.

Fast, Pain-Free Data Recovery: Do You Have the Right Elements in Place?

There are three critical elements you must have in place to quickly recover your data and IT system in the event of disaster. Yet did you know that most businesses ...
Cloud computing with a row of 5 server stacks.

Cloud Computing: The Good, The Bad & The Ugly

Cloud computing has great advantages, but its vulnerabilities can affect even the biggest tech names. When a network of internet of things (IoT) gadgets like routers, DVR machines and closed-circuit ...
hurricane planning for your tech

Protect Your Tech! Start Your Disaster Preparation Now

Many businesses were impacted by the hurricanes of recent years. Those that ultimately recovered had one thing in common—they were prepared ahead of time. While we can’t prevent or anticipate ...
A hacker hacking into email.

4 Emails You Should NEVER Open

No matter how “bomb-proof” we make your network, you and your employees can still invite a hacker in if you click on a link or open an attachment in an ...
A close up image of a computer motherboard and wiring.

The 4 Hidden Dangers of Electricity on Your IT Network

Is your computer plugged in? Do you use a power strip with a surge protector? If so, you are a heartbeat away from disaster and don’t even realize it. Believe ...
An individual working on a tablet with a virtual cloud importing data.

4 Must-Have, Low-Risk Cloud Solutions

Let’s face it—your business has more competition than ever. And they’ll eat you alive if you fall behind in today’s technology arms race. Maybe your network needs greater security. Or ...
A laptop with the warning window popping up with the ATTENTION warning across the screen.

10 Warning Signs of Impending Computer Disaster… And How to Prevent Them

The old saying that “an ounce of prevention is worth a pound of cure” is especially true in the world of technology. Computers rarely stop working overnight; in most cases, ...
A tablet sitting in the hands of a staff member with a padlock floating above it.

Think Your Business is Too Small to be Hacked? Think Again.

Despite high-profile digital security breaches showing up in the news nearly every week, most people assume they’re safe from attack. The thinking goes that while Fortune 500 corporations like J.P. ...
Man in black hooded sweatshirt with mask hacking a computer

Tax Season = Phishing Season

As you prepare your 2017 tax return, you’ll likely use email to send personal information to your accountants or other financial professionals. But as you sort through your inbox, can ...
man in grey hoodie sitting in darkness on the computer

4 Things You Must Do To Protect Your Organization From Identity Theft

While it’s impossible to plan for every potential scenario, a little proactive planning and proper network precautions will help you avoid or greatly reduce the impact of the vast majority ...
man in grey suit facing white hologram chart

You’re Ready for Irma… But What About Your IT Network?

You’re ready for Hurricane Irma… but how about your business technology? It’s not too late to protect your computers and data from the impending storm. Here are some quick steps ...
man holding lock icon

10 Biggest Myths of HIPAA Risk Assessments

We’ve heard the stories about electronic protected health information (ePHI) being misused or released to the public. But did you know that mere lack of protection itself can put you ...
ransomware skull key icon

Ransomware: Education is Your Best Defense

You sit down at your desk, log on to your computer… and are greeted with a brazen message: YOUR COMPUTER AND FILES ARE ENCRYPTED. YOU HAVE 96 HOURS TO SUBMIT ...
blue hallway with icons on walls and man in suit at the end

BrickerBot: Putting Security and Convenience at Risk

Technology makes it easier than ever to monitor your business when you’re not around. You can view live video feeds from surveillance cameras, set your building’s internal temperature, even turn ...
blue backup key on computer keyboard

Demand the Best from Your Remote Backup Service

Congratulations – you’ve made the wise choice of backing your data up to a secure off-site facility! But how do you choose the right firm to perform this very important ...
magnifying glass on red broken lock

The Yahoo Data Breach: Are You At Risk?

It has recently been discovered that the Yahoo network was compromised back in 2014, resulting in the breach of over 500 million user accounts. If you have a have a ...
fingers clicking on white lock icon

Facebook Privacy Considerations

Facebook’s algorithms to suggest friendships often bring to light convoluted yet amusing coincidences. You might see an acquaintance from high school reach out to a colleague at your workplace, or ...
woman holding tablet with icons coming out of it

Will Your Backups Be There When You Need Them?

When the livelihood of your organization depends on data stored in your computer network, you simply cannot afford to leave anything to chance. Data preservation and the ability to retrieve ...
purple coding and technology icon

Web Content Filtering, Your Luckiest Move of the Year

Do your employees bring their own smartphones, tablets or laptops to work? If your company is like most these days, they do. And that raises a whole new security risk ...
woman holding technology keywords

Technology Quick Fixes to Help Improve Your Business’ Productivity

Thank you for joining me for the second part of our technology business planning series.  Last month we focused on the user experience and how planning to upgrade those components ...
knob switching from problems to solutions

5 Simple Technology Solutions to Help Ensure Your Workplace Gets the Biggest Bang for its Buck

We know that technology should help us perform more efficiently. But, how often do you wait until a hardware or software failure forces you to reevaluate the right tools for you ...
gold lock on computer keyboard

Security Best Practices Check-List

Do You Have the Right Technology to Maintain Privacy & Minimize Data Breaches? Do you collect and maintain sensitive information (e.g. name, address, DOB, SSN, credit card or bank account information, ...