Get up to speed on today’s hot-button IT issues!
Check out our blog entries for up-to the minute information and advice regarding some of the most urgent topics we’ve covered.
How to Protect Donor Data from Prying Eyes
Donors trust your nonprofit not only with their money, but with their personal information as well. One way your organization can honor that trust is to ensure you protect donor ...
Should Your Business Accept Bitcoin Payments?
The payments ecosystem is complicated enough as it is. Throw in the growing prevalence of Bitcoin and other cryptocurrencies and you can’t fault business owners for feeling anxious. Nevertheless, businesses ...
Can Hackers Get Through Your Customer Service Chatbots?
Chatbots are some of the best AI-infused applications businesses can utilize. Depending on the size of your operation, you could save tens of thousands of dollars per year in customer ...
New Florida Law Requires Tougher Government Cybersecurity Standards
A new Florida law prohibits state agencies and local governments from paying ransomware demands. It also requires annual employee cybersecurity training and other protective measures to secure their technology. House ...
Preventing a Cyberattack at Your Business: Something Old, Something New
Another year, another slew of cyberattacks in the news — and 2021 was a doozy. According to Check Point, there was a 50% increase in attacks per week on corporate ...
5 Tips to Maximize the Benefits of Cyber Liability Insurance
Changes in costs and consumer demands in the past decade have accelerated the adoption of cloud-based infrastructure. Over 80% of small businesses now declare cloud computing important to their business, ...
3 Growing Trends for Disaster Recovery and Business Continuity Plans
Murphy's Law may not be scientific, but the spirit of the concept is more than a meme. Disruptive events like the COVID-19 pandemic and the 2007-2009 Great Recession prove every ...
CyberSecurity Primer for the Small to Mid-Sized Business
Small and midsize businesses face an increasingly complex digital landscape. On the one hand, cloud-based operations are almost unavoidable. Considering 40% of consumers start their search online, operating without a ...
Microsoft Hack: What You Need to Do Right Now
A recent cyberattack on Microsoft Exchange Server is believed to have impacted as many as 250,000 email servers covering nearly all business segments and sizes. If you have Microsoft Exchange ...
Leaders: Ask Yourself These Questions to Assess Your Data Breach Risk
Another day, another data breach. We have already seen several major ones during the first month of 2021. A database maintained by an online photo editing app containing 1.9 million ...
6 Steps to Shield your Payment Processing Setups from Online Dangers
Existing payment trends make one thing clear: Cash is on its way out. A 2020 Worldpay, Inc. study predicts that point-of-sale (POS) cash payments will drop from 30.2% of sales ...
Remote Control: Cyber Threats to Working From Home During COVID-19
More people than ever are currently working remotely because of COVID-19. While such arrangements have been on the rise the past few years, the pandemic has spurred a mass migration ...
Telecommuting Cybersecurity: Protect Your Network from Threats
With large masses of people transitioning to work-at-home arrangements, some employers are scrambling to establish remote IT setups. Unfortunately, this often results in rushed arrangements that neglect important security protocols. ...
Content Filtering: Why Appearances Can Be Deceiving
It’s another Monday, and you look over your office of busy employees hard at work on their computers. While it might seem like a productive scene, however, appearances can be ...
Size Doesn’t Matter: Why Your Small Business is a Cybercrime Target
In a world of rampant cybercrime, hackers thrive on the blind faith of their targets. Despite high-profile digital security breaches in the news nearly every week, most people assume their ...
3 IT Investments You Should Never Skimp On
There’s a disturbing trend underlying the business world’s increased reliance on technology. It’s true that the internet age has empowered companies of all sizes to do incredible things and that ...
Don’t Take a Pass on Secure Password Guidelines
Today almost everything you do—and almost all information about you—is on a computer or a website connected to the internet. And nearly all businesses, from your doctor’s office to your ...
Reviving a Network Ravaged by Ransomware: A Case Study
With ransomware on the rise, it’s critical to have an experienced, knowledgeable provider that keeps up with the latest on this ever-increasing threat. Check out this recent case study to ...
Five Ways to Mitigate Ransomware Damage
Lost files, denied access, ransom payments in the $100,000 range or higher… With the impact that hackers can have on your network and your business, we have always stressed the ...
Leverage Your Technology Budget Surplus
As the end of the fiscal year approaches for many businesses and organizations, managers often comb through their budgets in search of unused funds. Your technology budget should no exception. ...
Important Information Regarding Hurricane Dorian
Hurricane Dorian is expected to skirt the east coast of Florida on Wednesday, September 4 as a major Category 3 hurricane. From there, the storm is predicted to travel north ...
Are You Prepared? A Storm Prep Checklist to Protect Your Network
While we’re halfway through a (thankfully) quiet Atlantic hurricane season, that’s no reason to let your guard down. Not only are we approaching the peak of the season, there are ...
Fast, Pain-Free Data Recovery: Do You Have the Right Elements in Place?
There are three critical elements you must have in place to quickly recover your data and IT system in the event of disaster. Yet did you know that most businesses ...
Cloud Computing: The Good, The Bad & The Ugly
Cloud computing has great advantages, but its vulnerabilities can affect even the biggest tech names. When a network of internet of things (IoT) gadgets like routers, DVR machines and closed-circuit ...
Protect Your Tech! Start Your Disaster Preparation Now
Many businesses were impacted by the hurricanes of recent years. Those that ultimately recovered had one thing in common—they were prepared ahead of time. While we can’t prevent or anticipate ...
4 Emails You Should NEVER Open
No matter how “bomb-proof” we make your network, you and your employees can still invite a hacker in if you click on a link or open an attachment in an ...
The 4 Hidden Dangers of Electricity on Your IT Network
Is your computer plugged in? Do you use a power strip with a surge protector? If so, you are a heartbeat away from disaster and don’t even realize it. Believe ...
4 Must-Have, Low-Risk Cloud Solutions
Let’s face it—your business has more competition than ever. And they’ll eat you alive if you fall behind in today’s technology arms race. Maybe your network needs greater security. Or ...
10 Warning Signs of Impending Computer Disaster… And How to Prevent Them
The old saying that “an ounce of prevention is worth a pound of cure” is especially true in the world of technology. Computers rarely stop working overnight; in most cases, ...
Think Your Business is Too Small to be Hacked? Think Again.
Despite high-profile digital security breaches showing up in the news nearly every week, most people assume they’re safe from attack. The thinking goes that while Fortune 500 corporations like J.P. ...
Tax Season = Phishing Season
As you prepare your 2017 tax return, you’ll likely use email to send personal information to your accountants or other financial professionals. But as you sort through your inbox, can ...
4 Things You Must Do To Protect Your Organization From Identity Theft
While it’s impossible to plan for every potential scenario, a little proactive planning and proper network precautions will help you avoid or greatly reduce the impact of the vast majority ...
You’re Ready for Irma… But What About Your IT Network?
You’re ready for Hurricane Irma… but how about your business technology? It’s not too late to protect your computers and data from the impending storm. Here are some quick steps ...
10 Biggest Myths of HIPAA Risk Assessments
We’ve heard the stories about electronic protected health information (ePHI) being misused or released to the public. But did you know that mere lack of protection itself can put you ...
Ransomware: Education is Your Best Defense
You sit down at your desk, log on to your computer… and are greeted with a brazen message: YOUR COMPUTER AND FILES ARE ENCRYPTED. YOU HAVE 96 HOURS TO SUBMIT ...
BrickerBot: Putting Security and Convenience at Risk
Technology makes it easier than ever to monitor your business when you’re not around. You can view live video feeds from surveillance cameras, set your building’s internal temperature, even turn ...
Demand the Best from Your Remote Backup Service
Congratulations – you’ve made the wise choice of backing your data up to a secure off-site facility! But how do you choose the right firm to perform this very important ...
The Yahoo Data Breach: Are You At Risk?
It has recently been discovered that the Yahoo network was compromised back in 2014, resulting in the breach of over 500 million user accounts. If you have a have a ...
Facebook Privacy Considerations
Facebook’s algorithms to suggest friendships often bring to light convoluted yet amusing coincidences. You might see an acquaintance from high school reach out to a colleague at your workplace, or ...
Will Your Backups Be There When You Need Them?
When the livelihood of your organization depends on data stored in your computer network, you simply cannot afford to leave anything to chance. Data preservation and the ability to retrieve ...
Web Content Filtering, Your Luckiest Move of the Year
Do your employees bring their own smartphones, tablets or laptops to work? If your company is like most these days, they do. And that raises a whole new security risk ...
Technology Quick Fixes to Help Improve Your Business’ Productivity
Thank you for joining me for the second part of our technology business planning series. Last month we focused on the user experience and how planning to upgrade those components ...
5 Simple Technology Solutions to Help Ensure Your Workplace Gets the Biggest Bang for its Buck
We know that technology should help us perform more efficiently. But, how often do you wait until a hardware or software failure forces you to reevaluate the right tools for you ...
Security Best Practices Check-List
Do You Have the Right Technology to Maintain Privacy & Minimize Data Breaches? Do you collect and maintain sensitive information (e.g. name, address, DOB, SSN, credit card or bank account information, ...