PSA: Concerning Uptick in Email Threats

Img featured psa concerning uptick 1

As events in the world continue to unfold, we once again urge everyone to be very careful and vigilant about unusual activity on their devices as well as your emails.

Data Breach Investigations Report Findings

Img featured data breach investigation 1

The Data Breach Investigations Report findings for 2021 is the topic for today’s tech tip. The Data Breach Investigations Report (DBIR) is a report that analyzes all of the data breaches for the prior year.

What Is Endpoint Detection and Why Should You Demand It from Your IT Firm

Img featured endpoint detection 2

Thanks in part to the pandemic, the number of remote workers has significantly increased. This rapid growth caused many organizations to forgo proper security measures in lieu of productivity, even going as far as letting employees use their personal devices for work.  Instead of exploiting network vulnerabilities, hackers saw more success in targeting unsuspecting and […]

What is Shadow IT?

Img featured shadow it 1

For today’s, Tuesday Tech Tip I want to talk to you about shadow IT. What it is and why every business owner must have this on their radar?

Will Log4J Break the Internet? Experts Say Maybe.

Will Log4J Break the Internet?

One of the digital world’s most dangerous security breaches is currently unfolding, sending everyone from governmental agencies to cybersecurity experts scrambling to patch the hole. It comes at the hands of a critical software vulnerability discovered in Log4J, a Java-based software library used in nearly a third of all web servers in the world. Also […]

Beware Of Scams This Holiday Season

Welcome to another tech tip Tuesday today, we’re going to talk about the scams that we’re currently seeing out in the marketplace. What type of holiday scams are we seeing out in the marketplace? I want to talk about four of them that we’re seeing that are pretty prevalent. And the first one is mimicking […]

What We Know About the T-Mobile Hack 

What You Should Know About the T-Mobile Hack

Companies of all sizes can fall prey to cyberattack. Just ask T-Mobile, one of the largest telecommunications companies in the world and a recent victim of criminal hacking.   The massive data breach compromised the personal information of more than 54 million people, putting nearly half of the company’s customer base at risk. Among the data […]

How Security Awareness Training Can Greatly Reduce Security Breaches [VIDEO]

Did you know that 95% of breaches involve employee error? Your employees are both your greatest asset and biggest downfall. And right now, hackers are becoming more sophisticated and finding new ways to infiltrate your network through unsuspecting employees. Some of their latest schemes include fake emails and hacked websites. Your staff needs to be […]

One Surefire Way to Bounce Back from Ransomware [VIDEO]

Whether it’s ransomware or a flood, unexpected catastrophes happen. Instead of being reactive to an accident, prepare yourself and business for when it happens. The only way to ensure that your business can be back up and running fast is with a carefully constructed backup and disaster recovery plan. In this video, Phillip Long breaks […]