Should Your Company Outsource IT?

IT service providers deliver the technical expertise small businesses need at a much lower cost than hiring IT staff. They can recommend, install, and manage technology according to business’ objectives and core competencies and ensure that critical data is safe. That’s why nearly 70% of U.S. small to medium sized businesses (SMBs) work with an IT service provider for some …

How to Write the Perfect Email

Take a look at the unread emails in your inbox and make note of your course of action. Which emails do you immediately delete without opening? Open, but not scroll through entirely before deciding to delete? On the opposite end, which emails catch your attention, and do you click through the links contained within? Did the subject lines entice you, …

July Ransomware Attacks

Over the 4th of July weekend, anywhere from 800 to 1,500 businesses around the world were affected by a ransomware attack that centered on the U.S. technology firm Kaseya. The Florida-based company’s CEO said in an interview that it would be difficult to estimate the impact of the July attack because most of the targets hit were the customers of Kaseya’s customers. …

Compliance is a Team Effort

With all the rules and regulations surrounding the compliance alphabet soup in play today, it will take more than one person to bring your company in line. We’ve laid out the multiple roles needed to up your compliance game, especially when it comes to HIPAA, PCI, and GDPR! Horrible house guests, we’ve all had them. Whether it’s that annoying family …

June 2021 Data Breach — 8 Billion Passwords Leaked

What appears to be the largest collection of passwords of all time was recently leaked on a forum popular with hackers. A user of the forum uploaded an enormous 100GB TXT file containing nearly 8.4 billion passwords. It is assumed that these passwords are a compilation from previous large scale data leaks and breaches, now combined into one single document. …

Cloud Etiquette

Horrible house guests, we’ve all had them. Whether it’s that annoying family member that overstays their welcome, or that old college buddy that leaves beer cans and potato chip crumbs all over your couch. If you thought that was bad etiquette, you’ve yet to see the worst… Imagine coming into the office and finding that your current work has gone …

Compliance Alphabet Soup

No matter what industry you’re in, compliance acronyms are abundant, filling your days with both confusion and regulation. We call it the compliance alphabet soup. It’s time to make a little bit more sense of all those acronyms and what they likely mean for your business. GDPR (General Data Protection Regulation): While this regulation only applies to the European Union …

Is “The Cloud” Right for Your Business?

Everyone is talking about cloud computing these days and for good reason. The cloud is revolutionizing how computing power is generated and consumed. Cloud refers to software and services that run on the Internet, instead of locally on your computer. When tech companies say your data is backed up “in the cloud,” it has nothing to do with those white …

Tips to Spot a Phishing Scam

What is a phishing scam? Phishing is a cybercrime in which a target is contacted by email, telephone or text message by someone posing as a legitimate member of an institution in order to trick targets into providing sensitive data such as banking and credit card details or passwords. This fraudulently obtained information is then used to access the target’s …

6 Steps to Keep Safe Online

We all use the internet, and nothing is going to change that. But can we all use it safely? Avoiding sketchy websites used to be the key to protecting yourself online, and for the most part, it was rather easy to do. But now, avoiding malicious websites is only part of the gig. You can be infected with viruses, spyware, …