Blog
  • In virtually every business environment, a wide variety of personal and ‘approved’ devices are used throughout the day. This includes computers, tablets, smartphones and other Wi-Fi enabled devices. Each piece of equipment puts your entire network at risk if it is not properly secured and managed. You have a responsibility to protect the private information […]
    Do you know what your greatest vulnerability is? It’s your people. Employees unknowingly click on malicious links and download a host of viruses and malware every day. In fact, there is a hacker attack every 39 seconds and 63% of all network intrusions are due to compromised user credentials. Here are a few other disturbing […]
    For the past few years, there’s been a lot of buzz about migrating data to the cloud. For many, making the decision as to whether or not to rely on cloud computing and storage is not an easy one. It’s a bit like the renting vs. buying argument. When you upgrade your current on-site infrastructure […]
    Cloud Storage vs In-house Hosting

    Why Do Hackers Want My Data?

    Frank Riina
    By: David R. Herman – Director, Technical ServicesHacking has become so commonplace that many people have begun disregarding the potentially disastrous consequences of it. Why do hackers hack, anyway? Why are we burdened with the inconvenience and expense of firewalls, anti-virus programs, content filters, and having to sort through pages of spam selling you the […]
    Hackers Want Your Data
    How reliable is your current backup system? Would your business survive a technical disaster? When was the last time you tested your backup system?  These are some of the questions business owners should be asking themselves on a regular basis. Here are some of the answers we’ve heard through the years: I just bought my […]

    Ransomware Guide

    Frank Riina
    Ransomware has become an epidemic in today’s IT world. It has locked down hospitals, universities, small businesses, and individuals all over the world. Ransomware is malware that infects your computer by locking access to your files until you pay a ransom – usually in Bitcoin. The malware typically gets on your computer through a malicious […]