We’ve all received unsolicited calls before, most offering complimentary services or attempting to sell a product.  However, a growing trend in gaining access to an otherwise secure network involves deceiving a caller into divulging pertinent information, or worse, control of their computer to install malware. How It Works:  This alternate approach with initiating a hack by…

Read More

The topic of Ransomware is a steadily increasing mainstream topic affecting both small and large businesses alike.  We’ve discussed some of these common types of intrusions before, this type of malware encrypts your data and holds it for ransom to receive the key, it requires a fast acting user in order to minimize the amount…

Read More

There is a considerable amount of time and capital invested by business owners into their information technology (IT) infrastructures; it is often recognized as a vital component and foundation to the future success of an organization. Many hire outside IT service providers and specialists to either supplement their existing IT, or act as a business…

Read More

The trend of mobility and a more fluid workplace have changed professional environments in a relatively short period of time.  Mobile technology such as smartphones and tablets continue to redefine the way we work, because it changes when and where we are able to conduct business. We work from home, take conference calls en route…

Read More

One of the most common questions I face when meeting potential clients is “Why should I use a Managed Service Provider?”.  In order to fairly answer this question, traditional methodologies and misconceptions about what a Managed Service Provider (MSP) is, need to be thrown out the window.  The simplest definition of a managed service is…

Read More

A new study on the topic of Cyber-security and the proliferation of cyber-attacks against Small and Medium-Sized Businesses (SMB) was released this month. Historically, criminals would focus attacks on larger enterprise level organizations in an effort to reap a much larger reward. However, the level of technical expertise needed to infiltrate these companies’ security required…

Read More