Business Technology

IT Starts with Strategy

Learn how technology can maximize your business with a comprehensive IT strategy and support plan.

Blog Feature

Cybersecurity | Threat Prevention

By: Jason Rappaport
December 10th, 2019

You spend hundreds or thousands of dollars each year on anti-virus and threat prevention software for all the computers in your organization. As a result, you expect those devices are safe from viruses, ransomware, and other malware. But now you’re missing files, software programs are acting strange, or your entire system is frozen and you’ve received a ransom message. You’re frustrated, and maybe feel a little taken by your anti-virus vendor. Why have you been spending all this money on an anti-virus solution if you still have to deal with the ramifications of a virus or other malware?

Blog Feature

Cybersecurity | Threat Prevention

By: Michael McAndrew
December 5th, 2019

Computers are the center of business and personal productivity in the 21st century. Users expect them to work as intended, on time, and without issue. Unfortunately, this is not always the case. Viruses, or any type of malware (viruses are just one of several types of malware - more on that later), can at the least inconvenience users, and at worst cripple an entire business or organization. When trouble arises, average users may wonder if their computer is misbehaving. They might suspect malware has compromised their system, but don’t know how to confirm their suspicion. 

Blog Feature

Cybersecurity | Threat Prevention

By: Stephanie Hurd
October 6th, 2019

You use password-protected applications for everything from banking and financial management to planning vacations and socializing. In the workplace, sign-in credentials connect you and your employees to business applications and online services like payroll processing, appointment scheduling, invoicing, and every other confidential function of your business.

Blog Feature

HIPAA | Business Strategy | Cybersecurity | Threat Prevention

By: Stephanie Hurd
August 12th, 2019

On June 6, 2019, Presbyterian Health Services, a health care system and health care provider in New Mexico, discovered a potential breach of protected health information (ePHI). You might assume that a hacker breached their firewall or snuck into their network undetected. That was not the case. The breach occurred because well-intentioned employees fell victim to a phishing email.

Blog Feature

Cybersecurity | Threat Prevention | Disaster Recovery

By: Stephanie Hurd
May 22nd, 2019

National headlines about ransomware attacks crippling Baltimore City and Cleveland Hopkins International Airport might leave smaller businesses thinking that governments and large corporations are the only entities facing a real threat of attack. However, threats against businesses of all sizes have been on the rise. Malwarebytes Labs issued a Cyber Crime Tactics and Techniques 2019 Q1 Report stating that cyberattacks on businesses in general have increased 235% in the past year. Ransomware specifically is gaining rapid momentum in Q1 2019 with a 195% increase in ransomware attacks on businesses from Q4 2018 to Q1 2019.

Blog Feature

Cybersecurity | Threat Prevention

By: Aaron Sipes
February 27th, 2019

It happens quite often – someone points out to you that they’ve received a strange email from this person or that person, or maybe even you.  Of course, you don’t remember sending that email and why would you include the need to pay an invoice in it for a co-worker? Spam and spoofed emails are a common way hackers and malicious programs penetrate business networks, and are nearly impossible to prevent on a global basis for a given network. However, there are precautions that significantly decrease the volume of malicious emails and educate users on how to handle those that make their way into their inboxes.

Blog Feature

Cybersecurity | Threat Prevention | Disaster Recovery

By: Alex Samuel
February 21st, 2019

Cyberthreats are a major risk to every business of every size. Risks associated with viruses, ransomware, and identity theft can cost you lost revenue, loss of reputation, and in many cases even put you out of business. In today’s world, it’s not a matter of IF a business will experience a cyberthreat but WHEN, so all businesses must be prepared. Specific security requirements vary based on the size and scope of your business, nature of your work, and security compliance regulations. However, a good, multi-layered security approach for all businesses starts with threat prevention, but most important to protecting your business, is built on the foundation of a solid disaster recovery system. This approach should include the following components.