computer-security-day

Today Is Computer Security Day

Security is such an important factor of every day life that an annual day of recognition for has been established. Given the state of security and the advent of hackers and cybercrime in recent history, one would think that this occasion had been established as a direct response. The fact is, Computer Security Day is…Continue Reading


Warning: Scarab - Latest RansomWare Strain

Warning: Scarab – Latest RansomWare Strain

On November 23, 2017, a new RansomWare outbreak called Scarab, (first discovered in June by Michael Gillespie, was being distributed to approximately 12.5 million email addresses in the first hours alone. The virus was sent to domains that were primarily .com addresses. It also found its way to other top level domain extensions like .co.uk,…Continue Reading


9 Steps To Protect Your Data When Traveling

9 Steps to Protect Your Data When Traveling

The Holidays are now upon us and many will traveling. Whether it is to visit relatives, a secondary corporate location or client site across the country, travel may be part of your plans. In this day and age and considering the Internet Of Things and BYOD (Bring Your Own Device), the practice of taking extra…Continue Reading


Is Your Password Secure Enough?

Is Your Password Secure Enough?

Password security is increasingly becoming a major concern for people and businesses on a personal and professional level. Keeping your systems, devices and networks secure with strong passwords is an absolute must today. There is a good reason why Netflix warns users to change their passwords. When successful giants like LinkedIn, Google, eHarmony, Yahoo and…Continue Reading


Why you need a managed service provider

5 Reasons to Partner with a Managed Service Provider

The need for MSPs (Managed Service Provider) is on the rise, and with good reason. You may be familiar with the term and even the nature of an MSP. Your Managed Services Provider can take over your daily IT support and services and provide a measurable and quantifiable ROI. Among other additional benefits include lowering…Continue Reading


5 Steps to Network Security and Compliance

Network Security and Compliance Best Practices

Small businesses are often at a greater risk for cyber threats because they typically have smaller budgets and do not have the revenue to afford their own information technology departments to deal with these threats. In addition, 87 percent of small business owners do not believe they are at risk for an attack. As a…Continue Reading


hurricane preparedness for businesses

Hurricane Preparedness for Businesses Part 2: 5 Critical Steps to Ready Your Infrastructure Before A Storm

In Part 1, we discussed putting together a hurricane plan for your personnel and ensuring that you keep an open line of communication with emergency services organizations, local businesses, and vendors. Here in Part 2, we will take a look at hurricane preparedness from a business IT perspective. It is imperative that you also develop…Continue Reading


florida palm trees in a storm

How to Prepare Your Business for a Hurricane – Part 1

Until last year, Florida had not been directly hit by a hurricane since 2005. Yet, in 2004, the state was directly hit a record four times, which had never happened, dating back to 1850. Odds are Florida is due for another hurricane strike. In fact, according to the latest forecasts released by Colorado State University,…Continue Reading


Top 10 Ways Your Network Security Is at Risk

The recent ransomware cyberattacks in the United Kingdom and elsewhere around the globe remind us how vulnerable businesses can be to cyber criminals. During the last three years, Business Email Compromise (BEC) scams targeted more than 400 U.S. businesses every day and cost those companies $3 billion. Small businesses are particularly vulnerable to cyberattacks: they…Continue Reading


computer screen with risk assessment report

How to Remove Network Security Vulnerabilities

If your business operated with trade secrets and you knew there was a way your competition could access those secrets, you would seal that hole. If you knew your proprietary information was at risk, you would fix the issue. Removing network security vulnerabilities is one of the best things you can do for the future…Continue Reading


white open book icon

Want More IT Support Resources?

Check out our IT Support Resources for free Ebooks to help you troubleshoot your IT problems and prevent cyber attacks.

GET FREE RESOURCES