eCommerce Security Tips

By Isaiah Bollinger | April 6th, 2017| Network Security

eCommerce security is a constantly evolving topic for any organization, regardless of their size.  As the CEO & Cofounder of Trellis, a local full-service design firm, we partner with organizations to develop robust WordPress & Magento websites.  One of questions I often face is what a new or smaller business can do to improve their … Continued

Why Hybrid Technologies Make Sense…

By Gerard Louise | March 27th, 2017| Cloud Services

The latest outages of Public Internet Cloud Services, which affected millions of Microsoft Office365 and Amazon Web Services users in the US, is yet another example for why I am a strong proponent for businesses to consider a mix of Cloud and On-Premise technologies for hosting their data, commonly referred to as a Hybrid Infrastructure. … Continued

Network Security: The 5 Things Every Small Business Should Know

By Roger Murray | January 3rd, 2017| Network Security

Nearly every business believes the unfortunate data breaches and attacks only happen to others; that the overall risk of an attack on your business is low.  Why would anyone care to target me? The truth is that hackers would love nothing more than to gain access to your sensitive company data.  It’s why we decided … Continued

Identifying Tech Support Fraud

By Roger Murray | November 7th, 2016| Network Security

We’ve all received unsolicited calls before, most offering complimentary services or attempting to sell a product.  However, a growing trend in gaining access to an otherwise secure network involves deceiving a caller into divulging pertinent information, or worse, control of their computer to install malware. How It Works:  This alternate approach with initiating a hack by … Continued

Understanding Security Assessments

By Roger Murray | October 26th, 2016| Network Security

It may come as of little surprise that security breaches hurt small business much more than larger corporations. According to the National Cyber Security Alliance, more than 70% of attacks target small businesses.  It is also estimated that 60% of hacked small businesses experience devastating economic hardship, leading many to suffer a complete loss, closing … Continued

Understanding Information Technology Assessments

By Gerard Louise | October 24th, 2016| Network Security

The term Information Technology (IT) Assessment is often convoluted because it is so often portrayed as the simple and easy process of scanning an organization’s existing network.  However, this could not be further from the truth.  It is important to remember that a formal Technology Assessment is not a Technology Audit.   The use of terminology … Continued

Lost & Found: The Dangers of Mystery USB Drives

By Kenneth Sprague | October 3rd, 2016| Network Security

So if you found a USB Stick in the parking lot this morning, what would you do?  What if you found one in the course of your job, in a rental car, or in a “Lost & Found” box in your office?  You would be curious to see what is on the drive or inclined … Continued

An IT Director’s Best Practices for E-Mail Security

By Brian Downey | September 8th, 2016| Network Security

E-Mail is one of the most commonly used applications in the world.  It provides organizations with a quick and cost effective means to communicate and, from inception, it quickly became a necessity most businesses could not live without.  However, hackers are keenly aware of this fact as well and continuously devise new creative ways to … Continued

Top 3 VOIP Security Risks

By Roger Murray | July 6th, 2016| Governance & IT Compliance

In today’s day and age we have become familiar and hopefully cautious when receiving strange emails with a random file attached. It’s unlikely that we would give it a second thought before deleting. This is because we recognize the need for cyber security to limit the onslaught of digital threats we receive on a seemingly … Continued

Are you *REALLY* PCI Compliant?

By Roger Murray | June 23rd, 2016| Governance & IT Compliance

If your business processes credit cards or other forms of electronic payment, it is required to meet the standards established by the Payment Card Industry (PCI).  That means not only retailers, but any establishment that accepts card payments in their place of business.  If you don’t maintain PCI standards for compliance and suffer a data … Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979