When Your IT Goes Down, How Long Does It Take to Get Your Productivity Back Up?

When Your IT Goes Down, How Long Does It Take to Get Your Productivity Back Up?

Information technology is a sophisticated, multifaceted tool that touches every aspect of your business and requires regular maintenance to keep operating at full capacity.

IT problems can be small inconveniences like a printing issue or a full-blown catastrophe like a companywide data breach that interrupts your entire functionality, including client services.

How to Train Your Team Against Phishing Attacks

How to Train Your Team Against Phishing Attacks

Hackers are experts at their craft and always on the lookout for innovative ways to breach a network and extract private information. They cleverly mimic the company's own sites, for instance when hackers built an exact copy of a large local hospital's website.

Want Repeat Business? Protect the Customer’s Data

Want Repeat Business? Protect the Customer’s Data

Ask most CEOs how they get new customers, and “referrals” will be in the top three. How do you get referrals? Earn the trust of your customers, and they will tell their friends about you. On the other hand, if you lose that trust, customers will not only leave, but they’ll also tell their friends why.

7 Ways to Shop Safer Online

7 Ways to Shop Safer Online

Each year, Black Friday and Cyber Monday are expected to be a shopper’s paradise with the biggest discounts available from almost every retail store, in-store and online. With more than 4 billion internet users currently worldwide, it is also a hacker’s dream to target the expected two biggest online shopping days.

How to Know When Your Data Enters the Dark Web

How to Know When Your Data Enters the Dark Web

The breach of as many as 90 million Facebook accounts is bad news for the social media company, but it’s even worse news for the users whose sensitive personal data was compromised. That’s because hackers won’t make their money by posting an embarrassing status update or “liking” Nickelback on your profile.

What the Facebook Security Breach Means for the Rest of Us

What the Facebook Security Breach Means for the Rest of Us

Facebook has been under fire for a while because of its handling of user data, and its recent security breach has only amplified public scrutiny. It’s the biggest in the company’s history, and has implications that reach far beyond the potential 90 million compromised accounts.

Read more 2 Comments

IT Horror Stories – “I Quit” featuring a Professional Services Firm and the Internal IT Person

IT Horror Stories – “I Quit” featuring a Professional Services Firm and the Internal IT Person

Imagine that you are the managing partner at a professional services firm with fifty productive employees, hundreds of clients who love you, and one IT guy supporting your entire technology environment. This IT person has been a part of the team for ten years.

Featured on Due – 4 Strategies to Avoid Costly Credential Stuffing

Featured on Due – 4 Strategies to Avoid Costly Credential Stuffing

Cybersecurity threats are becoming more prevalent each year, and business owners need to focus on protecting their companies and upgrading their defenses. Companies that use the internet to do business are especially at risk for credential stuffing, a tactic wherein botnets attempt to use fraudulent login data to access information.

IT Horror Stories – Law Firm Liability

IT Horror Stories – Law Firm Liability

Imagine that you are the Managing Partner of a large law firm. One day in the middle of a big case, one of your attorneys is complaining about not being able to access an important case file on the network. A call into your outsourced IT Company and a scan through their computer verifies that there is in fact, an issue.

IT Horror Stories – The Hacked Financial Services Server

IT Horror Stories – The Hacked Financial Services Server

What would you do if you were running a financial services firm and discovered that one of your employees had clicked on an innocent looking email that turned out to be malicious (also known as email phishing) and now your cloud servers, and potentially all of your client-related information was exposed and potentially encrypted by an unknown hacker?  Sound like a nightmare scenario?  Well, that was the state for one local company until we were able to step in to help.