What is Endpoint Detection and Response (EDR)?

By |2022-08-18T09:35:42-05:00August 18th, 2022|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , |

The cybersecurity world is constantly changing, having to adapt to the latest threats. Everyone is familiar with antivirus, but did [...]

Comments Off on What is Endpoint Detection and Response (EDR)?

Phish Testing and Security Training

By |2022-08-18T09:36:19-05:00July 25th, 2022|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , |

In 2021, cybercriminals stole $2.4 billion through business email compromise attacks, often referred to as phishing. Phishing emails can sometimes [...]

Comments Off on Phish Testing and Security Training

Smishing – How to Deal with Text Message Scams

By |2021-12-07T15:11:36-06:00December 7th, 2021|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , |

Cell phones are becoming increasingly popular targets for hackers. As we do more business and financial transactions from our phones, [...]

Comments Off on Smishing – How to Deal with Text Message Scams

On-Premises Microsoft Exchange Vulnerability – Another Reason to Switch to Office 365

By |2021-03-09T17:51:01-06:00March 9th, 2021|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , |

On March 3, 2021, the US Cybersecurity and Infrastructure Security Agency (CISA) issued an Emergency Directive regarding vulnerabilities in on-premises [...]

Comments Off on On-Premises Microsoft Exchange Vulnerability – Another Reason to Switch to Office 365

Data Backup and Disaster Recovery – Vital for Your Small Business

By |2018-10-15T11:39:29-05:00August 22nd, 2018|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , , , |

In today’s business world, data is one of a business’s most important assets. Losing some or all of this data [...]

Comments Off on Data Backup and Disaster Recovery – Vital for Your Small Business

Top Security Threats to Your Small Business

By |2018-10-12T15:31:36-05:00June 5th, 2018|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , , , , , , |

Unfortunately, the bad guys are getting good at taking advantage of your small business.  How?  By using everyday tools that [...]

Comments Off on Top Security Threats to Your Small Business

Steps to Improve Network Security

By |2018-10-12T14:50:22-05:00April 25th, 2018|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , , |

Network security is one of the most important ways to protect your data from being stolen.  Cyberextortion happens every day, [...]

Comments Off on Steps to Improve Network Security
Go to Top