Computer Networking Blog

Is Your Small Business Overpaying Uncle Sam? Everything You Need To Know About Section 179

Is Your Small Business Overpaying Uncle Sam? Everything You Need To Know About Section 179

This tax deduction expands to a deduction limit of $1,000,000 level and is permanently  at this level until further notice.  This tax break for small businesses is intended to make it more affordable for small companies to buy business equipment

6 Steps to Prepare for a Cyber Attack

6 Steps to Prepare for a Cyber Attack

Many companies have an incident response plan that may look great on paper but they have not tested the execution. Key stakeholders must agree on the strategy, evolve it over time and be able to implement it confidently during an incident.

Local Alabama Hospital Wants to Settle Data Breach Lawsuit

Local Alabama Hospital Wants to Settle Data Breach Lawsuit

The data breach at Flowers Hospital in Dothan, Alabama finally nears the end after a four-year long nightmare. While there has been no final court approval, the hospital has decided to settle with the 1,200 victims whose information was breached. Each person will receive roughly $5,000 and Flowers Hospital has said payments won't total more than $150,000.
What Happened?

A lab technician at Flower Hospital stole PHI records to use in a tax fraud and identity theft scheme.

Microsoft End of Life 2020 Explained

Microsoft End of Life 2020 Explained

As with all of Microsoft’s operating systems, Mainstream and Extended Support is by Microsoft for a period of time. Microsoft calls its products “End of Life” when the Extended Support period comes to an end.

BYOD Security – What It Is and How It Affects Your Business

BYOD Security – What It Is and How It Affects Your Business

Despite concerns about Bring Your Own Device (BYOD) security risks, employees over the past years have enjoyed the multiple benefits of BYOD.  Employers are unlikely to ever stop staff from bringing their own devices to work or using them remotely for work purposes.

5 Things to Look For Before You Click – The Anatomy of a Phishing Email

5 Things to Look For Before You Click – The Anatomy of a Phishing Email

At the most basic level, a phishing scam involves sending fraudulent emails that appear to be from a reputable person or company, with the goal of deceiving recipients into either clicking on a malicious link or downloading an infected attachment, usually to steal financial or confidential information.

How Security Awareness Training Can Greatly Reduce Security Breaches [VIDEO]

How Security Awareness Training Can Greatly Reduce Security Breaches [VIDEO]

Did you know that 95% of breaches involve employee error? Your employees are both your greatest asset and biggest downfall. And right now, hackers are becoming more sophisticated and finding new ways to infiltrate your network through unsuspecting employees.

One Surefire Way to Bounce Back from Ransomware [VIDEO]

One Surefire Way to Bounce Back from Ransomware [VIDEO]

Whether it's ransomware or a flood, unexpected catastrophes happen. Instead of being reactive to an accident, prepare yourself and business for when it happens. The only way to ensure that your business can be back up and running fast is with a carefully constructed backup and disaster recovery plan.

How a Lost Device Could Cost You Thousands [VIDEO]

How a Lost Device Could Cost You Thousands [VIDEO]

Do your employees access company data on mobile devices? According to Sprint Business, 25% of lost or stolen devices end up in a security breach. Even worse, only 43% of staff report that their device is missing on the day it goes missing. That's more than enough time for someone to hack the device and steal company data.