No Business as Usual

Currently, there is no such thing as Business as Usual. Every day, small and medium businesses are re-inventing how they function. The most unfortunate side-effect of this COVID-19 crisis is that many small businesses have closed, and many of those will not re-open. The economic repercussions from this event will ripple throughout the landscape for decades. Only the strong will survive.  For those who will survive this paradigm shift, now is the time to re-structure Continue Reading

Should’ve seen it coming…

You’ve invested in a BDR (Backup and Disaster Recovery) and now sleep more soundly at night, but the hardware itself is really only part of the solution. You want to ensure your provider does preventative maintenance, periodic testing, multi-location storage, and staff training. Having these things in place will help avoid downtime if the worst happens.  Preventative Maintenance: In addition to the hardware itself, a solid backup solution also has its own backup including generators, backup Continue Reading

What Could Happen Without a Plan

Backup Disaster Recovery is one of those things that all businesses need to have in case of disaster. Whether it’s a natural disaster such as a tornado, a hardware failure, or even an attack from a hacker. Anyone of these could permanently disable your business if you aren’t prepared or have a proper backup plan. For those of you still backing up data manually on tapes or *cringe* not at all, here are some reasons Continue Reading

5 Ways to Adapt in this New Work World

You’ve probably grown tired of hearing the words “adjusting to the new normal.” Unfortunately, though, there’s really no other way to say it. This pandemic has permanently changed our work environment, whether you’re already back in the office or remain in quarantine for several more weeks. We must create a new normal for how we work, manage network security, and maintain productivity across a more widespread team.  For example, a client earlier this week asked with their Continue Reading

Cyber Phishing 101

While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% in the last year.  What exactly is phishing? Hackers mimic the emails, forms, and websites of legitimate companies in an effort to lure people into providing their private, Continue Reading

Are you on a Hackers Watchlist?

In the last decade, billions of people have had their information stolen from one, if not multiple, business sectors. Technology is constantly expanding, and with new technology comes new ways of hacking into seemingly secure data. As technology advances, people tend to forget about outdated technology and are lackadaisical about security. Outdated devices, human error, malware and theft are all things that contribute greatly to the possibility of a data breach. It’s important to ensure companies are well Continue Reading

Mischievous Malware

Unfortunately, malware is not a foreign term, in fact it’s pretty well known to anyone that uses a computer. There are several types of malware, as well as mediums in which you may receive it. So, before you click on that link for the free cruise you won, think about all of the personal data you could be giving away. First, let’s take a quick tour of the types of malware you may run into.  Viruses: These act Continue Reading

The Cyber Threat That Holds Your Data For Ransom

“One million dollars!”  It’s the classic line from Dr. Evil, the villain from Austin powers, when he threatens the world with a nuclear bomb. This iconic scene may bring laughter to our minds, but in real life anything dealing with ransom is typically void of laughter. Ransomware is no exception!  What Is Ransomware? Ransomware is a software, paired with a hacker, that kidnaps your data and ransoms your company! When this happens, you have limited options; Continue Reading

Social Engineering = Fancy Job Title for Hackers

Most people are aware of terms like phishing and malware, but do you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud; in fact, it’s been used for many years to manipulate a wide range of people into giving up important data about themselves or workplace. A prime example of social engineering goes back to Greek mythology with the Trojan horse. They infiltrated the city of Troy with a “peace offering” filled Continue Reading

Is the Dark Web all bad?

Dark Web: (noun) Part of the world wide web that is only accessible by utilizing special software, allowing users and websites to remain anonymous or untraceable. It exists on an encrypted network that uses masked IP addresses to maintain anonymity for users and site owners.  If this is all new to you check out our earlier article; What is the Dark Web As you can see by the above definitions, the Dark Web can be a shady place where illegal Continue Reading