Why You Should Scam Your Own Employees

By Roger Murray | February 2nd, 2017| Network Security

Identifying network vulnerabilities, as well as the right tools to address them, have become of major concern to many organizations. According to industry leaders, businesses should consider a rather unorthodox approach to educating and identifying exactly how prone they are to a data breach, scam their employees. Simulating phishing attacks provide a quantifiable insight at … Continued

Is Your Business Winter Ready?

By Roger Murray | January 20th, 2017| Backup & Disaster Recovery

Hacks and Ransomware Attacks often catch the headlines for their wide impact and compromised data.  However, for many businesses located in colder climates, a very real threat to their daily operations revolve around the worst winter weather, much of which is still ahead of us.  Inclement winter weather can lead to disruptions in your normal … Continued

How To: Guard Against HIPAA Privacy Breach Fines & Violations

By Roger Murray | January 16th, 2017| Governance & IT Compliance

In 2016, the Health Insurance Portability & Accountability Act (HIPAA) collected over 23 Million in Civil Money Penalties (CMPs) related to businesses violating patient data privacy provisions.  Over half of the cases involved organizations who failed to even have a proper risk assessment conducted. The cost for violating HIPAA privacy protections continue to grow, which … Continued

New Year New Approach to Backup & Recovery Plans

By Roger Murray | January 5th, 2017| Cloud Services

One of the essential components to any business revolves around the protection of their data.  Continuity in the event of an IT disaster, or even minor downtime, is critical.  Ensuring your business can access critical information in those moments, as well as having the ability to recover can save thousands of dollars per hour depending … Continued

Network Security: The 5 Things Every Small Business Should Know

By Roger Murray | January 3rd, 2017| Network Security

Nearly every business believes the unfortunate data breaches and attacks only happen to others; that the overall risk of an attack on your business is low.  Why would anyone care to target me? The truth is that hackers would love nothing more than to gain access to your sensitive company data.  It’s why we decided … Continued

Why Your Business Needs a WISP

By Roger Murray | December 29th, 2016| Governance & IT Compliance

Not having a written information security program (WISP) for your business could be putting your data at risk of not only theft, but substantial legal/punitive damages. The laws in Massachusetts enforce strict guidelines to safeguard any personal information of individuals stored on your network. Sadly, many SMBs brush it off as a minimal danger that … Continued

5 Things to Look for in a Managed Service Provider

By Roger Murray | December 14th, 2016| Managed Services

The role of IT in up & coming businesses often becomes an afterthought.  One day, you are a small team with a singular goal, with a lot of hard work and a bit of luck, your business begins to thrive; staff assume more and more responsibilities to keep things moving smoothly, before you know it, … Continued

What are the Benefits to Cloud Computing & IaaS?

By Roger Murray | December 7th, 2016| Cloud Services

While the reasons behind considering a cloud based network infrastructure may vary, businesses across all industries and sizes are turning to the cloud to scale their organization.  The adoption of cloud services is accelerating at a much more rapid pace than previously anticipated, with a considerable amount considering an Infrastructure-as-a-Service (IaaS) environment. But what are … Continued

Identifying Tech Support Fraud

By Roger Murray | November 7th, 2016| Network Security

We’ve all received unsolicited calls before, most offering complimentary services or attempting to sell a product.  However, a growing trend in gaining access to an otherwise secure network involves deceiving a caller into divulging pertinent information, or worse, control of their computer to install malware. How It Works:  This alternate approach with initiating a hack by … Continued

What to do during a Ransomware Attack?

By Roger Murray | September 28th, 2016| Network Security

The topic of Ransomware is a steadily increasing mainstream topic affecting both small and large businesses alike.  We’ve discussed some of these common types of intrusions before, this type of malware encrypts your data and holds it for ransom to receive the key, it requires a fast acting user in order to minimize the amount … Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979