Happy Monday! We just wanted to send out a reminder to all our clients that are currently using Microsoft Windows Operating System 7 or Microsoft Windows 2008 and 2008R Server software that end of life is coming up January 14, 2020. What does this mean to you? Below we put together an explanation of each. […]
As with every organization, job functions vary by department, but we all share one common responsibility: protecting the private data of our clients, customers, partners, and co-workers.
Employee Security Training Human-error; we talk about it all the time, but what exactly do we mean? Human-error occurs when an individual performs a task or does something with an unintended outcome. It’s easy to point the finger at employee’s as being an organization’s weakest link, but without appropriate security awareness training provided by the […]
How Does the Dark Web Impact Small to Medium Size Businesses Identity theft is an unfortunate occurrence that is all too familiar with most business owners, but do those individuals know where the compromised data will end up? Often, these business owners are unaware of the virtual marketplace where stolen data is purchased and […]
Last month we talked about Cyber-Security and how Small and Medium-sized businesses are prime targets to cyber-attacks. We wanted to follow-up with creative ways on how these attacks are happening. So, in this segment we wanted to share a little bit about passwords and how important it is to have a great Password Policy.
Cyber-Attacks Small- and medium-sized businesses (SMBs) are the prime targets for cyber-attacks because they tend to be easier targets. They’re often less secure and unprepared for attack. Think about burglars that go after houses where they know no one is home. With more cyber crime automation and the rise of hacking kits, the […]
As technology advances in the industry, many companies are looking for the best competitive edge. Some companies go above and beyond to provide the greatest service possible to their clients. Unfortunately, there have been more concerns about scams via phone calls and other sources. We’ve had a number of clients receiving phone calls (sometimes multiple […]
If you haven’t heard of this phrase, it describes software that is run on a computer and it’s goal is to encrypt your files and then pop up an alert that wants to extort you (the user) into paying to “unlock” your files. This type of Malware has been called a number of different names; […]
In our last two posts, we’ve discussed the basic definitions of cloud services and a few considerations when moving to the cloud. In our final post of our three-part series, we would like to discuss practical configuration examples we would use when utilizing “the cloud” for your infrastructure. (We know, these posts are a little techie/geek-speak… […]
We hope you had a great (and long!) holiday weekend celebrating the fourth! Last week we discussed definitions and considerations when looking to utilize the cloud. As you can tell, it’s not as straight forward as some marketers let on. We know this is a little more on the technical side: just remember we’re here […]