Cybersecurity & IT Insights

Small Business Cyber Threats

For several years now, there have plenty of scary headlines out there referencing billions in losses due to ransomware.  But are those losses real or estimated?  How is ransomware being defined?  And why do these stories always seem to be pushed by someone selling...

read more

Technology Alone Can’t Beat Ransomware

Ransomware is still a threat, and CEOs need to do more to protect their companies Ransomware has had its ten minutes of fame. For a while there, it seemed like every technology article was about how ransomware was hitting another major company. Pretty soon, the media...

read more

Biggest Data Security Risks

While all of the facts haven’t yet come to light, Tesla looks like it might be in a bad situation due to an employee’s actions.  This employee (who was disgruntled, concerned, or both) claims to have provided outside sources with proof that the company has installed...

read more

Technology Upgrades Can Attract Top Talent

New technology can help businesses bring their data together, be more responsive to customers, and be more efficient. For example, cloud-based software can make it easier for businesses to access and share data across different departments, and customer relationship...

read more

Internal IT vs Managed IT

Whether you run a 15-person company that’s considering its first IT hire, or a 100-person company looking at expanding your IT team, there’s a lot of value that technology expertise can bring.  It can improve employee productivity, make it easier to contact prospects...

read more

Is Technology the Root of Your Problem?

Some problems are obviously technology problems.  When your email server is down, it’s pretty clear what needs to get fixed and who needs to fix it.  It’s not a “user problem” when the printer is jamming on every third page. Sometimes, however, it’s not as clear that...

read more

CEO Impersonation Fraud is Still a Big Problem

We’ve talked about the dangers of CEO Fraud in the past.  This fraud involves a criminal impersonating a company’s CEO.  Often, the impersonator requests a transfer of money to complete a time-sensitive deal. These attacks are very different than the poorly-crafted...

read more

Consumer Routers vs Business-Class Routers

From time to time, a client will have a need for additional network ports or want to expand their wireless coverage, and ask if they can get a router or wireless access point like the one they have at home to do exactly that.  Unfortunately, that’s almost always a bad...

read more