5 Things to Look For Before You Click – The Anatomy of a Phishing Email

5 Things to Look For Before You Click – The Anatomy of a Phishing Email

At the most basic level, a phishing scam involves sending fraudulent emails that appear to be from a reputable person or company, with the goal of deceiving recipients into either clicking on a malicious link or downloading an infected attachment, usually to steal financial or confidential information.

How Security Awareness Training Can Greatly Reduce Security Breaches [VIDEO]

How Security Awareness Training Can Greatly Reduce Security Breaches [VIDEO]

Did you know that 95% of breaches involve employee error? Your employees are both your greatest asset and biggest downfall. And right now, hackers are becoming more sophisticated and finding new ways to infiltrate your network through unsuspecting employees.

One Surefire Way to Bounce Back from Ransomware [VIDEO]

One Surefire Way to Bounce Back from Ransomware [VIDEO]

Whether it's ransomware or a flood, unexpected catastrophes happen. Instead of being reactive to an accident, prepare yourself and business for when it happens. The only way to ensure that your business can be back up and running fast is with a carefully constructed backup and disaster recovery plan.

How a Lost Device Could Cost You Thousands [VIDEO]

How a Lost Device Could Cost You Thousands [VIDEO]

Do your employees access company data on mobile devices? According to Sprint Business, 25% of lost or stolen devices end up in a security breach. Even worse, only 43% of staff report that their device is missing on the day it goes missing. That's more than enough time for someone to hack the device and steal company data.

How Asset Management Can Save You $12,000 Per Year [VIDEO]

How Asset Management Can Save You $12,000 Per Year [VIDEO]

Asset management is often overlooked by businesses because they don't feel it's important. People will use desktops and laptops until the very end, no matter the age of the equipment. While the computer itself doesn't get slower, the demands we put on it get higher leading to the slowness we all detest.

What You Need To Know About The New Data Breach Notification Law

What You Need To Know About The New Data Breach Notification Law

The Act requires companies to provide Alabama residents with notification of a breach within 45 days of discovery. Notification is triggered by a determination of a breach that poses a risk of harm to impacted individuals.

Many People Don’t Know This About Patch Management…[VIDEO]

Many People Don’t Know This About Patch Management…[VIDEO]

When it comes to patch management, many people think they've got it covered and that their network is safe. Unfortunately, this is not the case. Windows doesn't do a great job of updating patches and lots of things get missed. Plus, employees push off updating their computer because of the time it takes to do it.

The Basics of Desktop Security Protection [VIDEO]

The Basics of Desktop Security Protection [VIDEO]

Phillip Long, local security expert and CEO of BIS Technology Group, discusses the basics of desktop security protection in his fifth installment of the Defense-in-Depth video series. As you'll find in the video, there's more to anti-virus and desktop security than blocking viruses as they aren't the only threat to your business.

Does My Company Need a Security Operations Center Service (SOC)?

Does My Company Need a Security Operations Center Service (SOC)?

You can’t manage what you can’t see. Even a small network generates over 250,000 logs per hours. An impossible task for a human to review. We now live in the days of sophisticated digital hackers so your concern shouldn’t be if you’re going to get hacked, but what you’re going to do when it happens.

3 Ways to Shield Against Internet-of-Things Security Threats

3 Ways to Shield Against Internet-of-Things Security Threats

IoT in all its flavors (e.g., physical security systems, lights, appliances, heating and air conditioning systems, as well as artificial intelligence-based automated agents such as chatbots) exposes companies and consumers alike to a wide range of security threats.